0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Access Buildings with Social Engineering
By: Tatianna
November 19, 2018

Social engineering has always been a strange topic. If there’s something posted online about it, it’s either boring and no-one wants to read it, or it’s misconstrued ...

New to Cybrary: Joe Perry
By: Tatianna
November 15, 2018

New to Cybrary: Joseph Perry One of the newest members to the Cybrary team is Joseph Perry . You may have already seen his Python for Security Professionals course, but we want to introduce you to the SME behind the course and why Joe is an important part of the Cybrary Team. There's a ...

Ultimate Guide to Getting a VMware Engineer Job
By: Vikrant Saran
November 13, 2018

VMware is one of the most in-demand technologies in virtualization and cloud computing sphere. Owing to its rising demand in the IT industry and other enterprises, jobs in virtualization is very high. VMware provides an excellent feature to the users. As cloud computing and virtualization has solved many issues of an organization with an ease. One of ...

Is your cell phone under surveillance?
By: Guest Writer
November 11, 2018

Cellphones have become a ubiquitous influence in many individuals lives. And although every cell phone owner walks around with a device in their pocket - or in hand - that is capable of tracking their location and transmitting a wide range of messages, most owners have no idea about the security of their device . These messages may be ...

Passwords Aren't Enough: History of Passwords, Malware and More
By: premraj59
November 9, 2018

Passwords are secure keys that we have to remember to access some document securely, online or offline. Sometimes they may be the only obstacle between a hacker and you. Today, password security is employed by all major sites across the internet and even in the local accounts of your PC, Laptop or Phones. Although there are many ...

Exploiting Vulnerabilities of Windows 2000 Server using NMAP, Nessus and Metasploit
By: Ace
November 6, 2018

Using NMAP to identify OS and services on the vulnerable machine (Windows 2000 server) Nmap is a free and open source for network discovery and security auditing. Firstly we have to setup the virtual environments of vulnerable machine (Windows 2000) and kali Linux on the VM virtual box. And ...

Career Change From Military Logistician to I.T. Specialist - Success Series
By: cybergary
November 5, 2018

Justin B. is an Insider Pro member who chose to make a change in his career path, and made it happen with his own motivation, determination, and ambition.  Here’s his success story, in his own words: Where to start, it has been a crazy year. It started back in February when I, ...

Spoofing: RFID and SMS
By: Tatianna
November 5, 2018

Spoofing, in Simple Terms First, let's start with a definition - What is Spoofing? According to ForcePoint , "Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails , phone calls, and websites, or can be more technical, such as a computer ...

Task Automations on MacOS - AppleScript
By: Guest Writer
November 3, 2018

AppleScript (AS) is not a name frequently used in cybersecurity. This specific language is based on JavaScript and is used exclusively for automation tasks within the Mac OS. AppleScript can be used to move and click a mouse, enter text, resize windows, change volume levels, and generally carry out any input function the user does. The power of ...

New to Cybrary: Ken Underhill, Master Instructor
By: Tatianna
November 1, 2018

New to Cybrary: Ken Underhill, Master Instructor One of the newest members to the Cybrary team is Ken Underhill, CEH, CHFI . You may have already seen his new Ethical Hacking course which launched a few weeks ago, but we want to introduce you to the SME behind the course.  The Master at Work As ...