0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Security+ Certification Success by Cybrary Member @aer9480
By: ryan c
June 29, 2015

Below is an email we received from Cybrary Member @aer9480. He wrote to tell us about the success he had in passing the exam after taking our Security+ Course .If you have a similar success story, we'd love to share it. Send an email telling us about it: support@cybrary.it Here's @aer9480's email:Hey everyone. My name is Alan Raff. I am ...

A Social Engineering and Manipulation Teaser
By: Ξ B ☢ B Ξ
June 29, 2015

“Humans are, and always will be, the weakest security link.”   It's amazing how many companies I've worked with during Pen-testing/Ethical Hack engagements that have either foregone the social engineering aspect of the hack or limited the social engineering test to a single instance in a single category. And, it really gets me when ...

9 Surprisingly Prevalent Social Engineering Techniques
June 26, 2015

This article will illustrate 9 surprisingly prevalent techniques used by attackers to carry out social engineering offenses.   Human-Based and Computer-Based Social Engineering   1. Impersonation: “An impersonation attack is an attack in which an adversary successfully assumes the identity of one of the legitimate parties in a system or in a communications protocol” (Encyclopaedia ...

A Method for Bypassing Keystroke Recognition Based Security System Using Social Engineering
By: xc0de
June 25, 2015

A Method for Bypassing Keystroke Recognition Based Security Systems Using Social Engineering Abstract: In this paper, we aim to use the power of Social Engineering to bypass a Keystroke Recognition based authentication system. We have designed a virtual chat system (basically a chat bot), coded in Python , which performs the ...

Reset Windows Passwords with Kali Linux
By: fr4nc1stein
June 24, 2015

Reset Your Windows Password Using Kali Linux Hello Cybrary members.Here I am again to talk about Passwords for Windows 7 or any version of Windows. Sometimes, we forget our password, or we want to reset the Windows password for a friend, officemate or anyone's laptop in legal way.  Today, I'm am going to teach ...

Why Isn't That Course Live Yet?!
By: klowe
June 23, 2015

We get it. We truly do. We're JUST as excited about our new classes as you. We understand the anticipation, the anxiousness and the frustration. You joined Cybrary just fo r Malware Analysis . You refresh the Metasploit course page daily.  We get it, because we created ...

Tutorial: Using SSLSTRIP in a "Man in the Middle" Attack
By: fr4nc1stein
June 23, 2015

SSLSTRIP in a Man in the Middle Attack  Hello guys,In this tutorial, I'm going to teach you how to use a SSLSTRIP via the Kali OS.We'll use SSLSTRIP for sniff or steal password in a Target PC via LAN (Local Area Network). SSLSTRIP is known in hijacking HTTP traffic on a network. ...

CompTIA Security+ Certification, Evolution and Innovation for Sustained Relevancy
By: ryan c
June 23, 2015

Many companies, throughout the years, have failed because they failed to innovate and change. Many great market leaders, like Kodak, even held in their hands the future of their industry, and still refused to embrace it. Change is always difficult for someone of something in a position where status quo is providing awesome returns. It takes courage to innovate, and ...

2 Key Elements of Your Info Sec Job Search
By: DocGreenBanner
June 22, 2015

This is a primer for new job seekers and a refresher for seasoned job seekers.  People often ask, " How do I find and get Info Sec jobs? "This document will: identify online and offline job sources provide key elements of a good resume ...

The Role of Information Security Governance and Risk Management in the CISSP certification
By: Rachel Laura M
June 22, 2015

The Certified Information Systems Security Professional (CISSP) certification is a strong credential to have for professionals who have a mix of both technical and managerial experience as well as competence in designing, engineering and the overall management of security programs. Their knowledge helps protect company’s important and confidential information from the growing threat of cyber attacks. This certification is perfect ...