0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Methodology of information gathering and testing in social engineering
By: Laird
July 28, 2015
Obtaining information for social engineering, or from the target organization knowingly made unwitting available. As with anything should first be taken ethical considerations into account.To answer the question of whether the use of social engineering techniques as part of a penetration testing is acceptable , should first be shown why social engineering ever successful:The techniques work ...
MDK3 Option B method - Beacon Flood (With proof of working too)
By: Kevin Mark
July 24, 2015
MDK3 Option B.Option -b means it's a beacon flood, it will send to a target a lots of fake APs, which can crash scanners, drivers and make more harm to a target then you imagine, and can suprise you a lot if you don't take any cauction with this attack.1. airmon-ng start wlan0 ->>>> Should say this " (monitor mode ...
The Ethical Hacker's Guide to Cracking WiFi (WPS)
By: Kevin Mark
July 23, 2015
Hello and welcome to this little tutorial! We're going to use Reaver and Wash. For those of you who don't what Reaver and Wash are, Google them. In short, Reaver tries different pins until it catches the right one. It TAKES HOURS TO CRACK A PIN, so be patient. You can use OS X, Kali package ...
7 Steps to Lock a Folder (Plus a BONUS)
By: orion
July 20, 2015
7 Steps to Locking a Folder (Plus a BONUS) 1.Open Notepad. Copy and paste the code below: cls @ECHO OFFtitle hackingif EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" gotoUNLOCKif NOT EXIST MyFolder goto MDMyFolder:CONFIRMecho Are you sure to lock this folder? (Y/N)set/p "cho=>"if %cho%==Y goto LOCKif %cho%==y goto LOCKif %cho%==n goto ENDif %cho%==N goto ENDecho Invalid ...
Securing Your Unix Operating System
By: Er. Ragini
July 17, 2015
Hi Team,I'm sharing my knowledge about UNIX OS.  Some important settings could protect your system. It's also important to know your OS system well, including its security file settings.  Depending on your networking settings, you may be more open to attacks or vulnerabilities, such as: ICMP redirects ...
A Short Practice Guide for PenTests
By: Laird
July 16, 2015
A Short Practice Guide for PenTests Definition: A penetration test is a proven method that looks for security weaknesses, potentially gaining access to the computer's features and data. Typical starting points for penetration tests are: Active components like router, switches or gateways Security gateways like firewall, packet filter, intrusion ...
How to Fix a Virtualbox Showing Only 32Bit Guests on a 64Bit Host
By: Darshan Bhavsar
July 16, 2015
Today, I'm going to show you how to Fix a Virtualbox Showing Only 32Bit Guests on a 64Bit Host.In Windows-based Os's, there's a function called "Virtualization". Virtualization is: a hardware virtualization or platform virtualization, which refers to the creation of a virtual machine that acts like ...
Public, Open Wireless Hotspots: To Connect or Not
By: Paddy
July 15, 2015
Abstract This paper highlights the risks involved with connecting to an untrusted network such as public Wi-Fi.  These networks are highly insecure due to data being emitted through airwaves.  This allows for attackers to easily eavesdrop on network communication by creating an evil twin access point and taking advantage of devices ...
Metasploit: Routing Traffic from a Non-Routable Network
By: Multi Thinker
July 14, 2015
According to Offensive-Security: Pivoting is the unique technique of using an instance (also referred to as a ‘plant’ or ‘foothold’) to be able to “move” around inside a network. Basically using the first compromise to allow and even aid in the compromise of other otherwise inaccessible systems. In this scenario, we'll be using it for routing traffic from a ...
How to Get Screen Captures Using Metasploit and Meterpreter
By: Multi Thinker
July 14, 2015
Hi Again,Today, using metasploit and meterpreter, I will tell you how to screen capture a victim's PC / applications.What we need is metasploit and meterpreter configured and opened. This step starts when we have any meterpreter session opened. Every time, after going to CMD, we have Meterpreter Session opened, don't ...