0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


With the growing concern of online privacy, this is by far the best way I've found to keep your communications private using a combination of O.T.R., TOR, Linux and a trustworthy VPN service. Note - This guide can be used by the following communities of people and others: Activists: ...


At Cybrary.it, it's all about security and penetrating. I've decided to write this little guide for testing your own firewall configuration. We're going to use Firewall Tester (FTester) tool. Important: this tool is now outdated. However, I find it still useful and nice to use for beginners. The Firewall Tester ...


It's hard to administer systems nowadays without security. Managing and administering systems almost always includes a security component, if not an outright security focus. Are you interested in moving from a systems administration position into a more security-focused role? And, do you want to design your career in information systems? As an example, consider that ...

Internet Protocols: Versions 4 and 6 Analysis and Comparison of IPv4 and IPv6 Usman Jibril Department of Management Information Systems Cyprus International University Lefkosa, North Cyprus. wushi09@outlook.com Akintoye Oluwasegun Ogundiya Department of Management Information Systems Cyprus International University Lefkosa, North Cyprus. ...


What is SQL Injection? SQL injection is a subset of the "code injection" attack method. SQL stands for Structured Query Language and is used by databases to store and retrieve information. Many websites require this capability web developers use a server-side scripting language - often PHP or ASP - to pass user input to a ...


Hi Pentesters, while pursuing the course on Ethical Hacking and Penetration Testing , we often feel the need to have our own pentesting lab to practice all the stuff we're learning during the course. I am no exception, so I began searching for a way I could do this. After gathering some info, I found a way and wanted ...


Security Operations Centers are essential part for dealing with cyber security threats where enterprise information systems are monitored, assessed and defended. SIEM (Security Information and Event Management), which is a combination of SIM (Security Information Management) and SEM (Security Event Management) provides near real-time analysis of security alerts generated by network hardware and applications.Different vendors provide different solutions and ...


Hello, this is a short guide on how to use the Python Scripting language to facilitate Tasks in Linux. I'll start by giving a small overview on what Python is:According to Wikipedia," Python is a widely used general-purpose, high-level programming language . Its design philosophy emphasizes code readability, and its syntax ...


Given we're a cyber security education company, we like to preach (maybe too much at times) about how darn important security awareness training for employees really is. So, we thought we'd share the hideously ugly lesson that internet authority company, ICANN, learned about security awareness not too long ago. Reliving the ICANN Phishing Hack: Phishing is ...


Please note: some of the backslahes ( \ ) in the coding below may have been removed by the WordPress program. When you press enter, the program doesn't just run. There's an order of operations that takes place. Understanding this order can keep you from making some pretty big mistakes. Let's take a command and break apart what ...