0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Kali Linux Command Lines Part 2 – Working with Directories
By: bjacharya
December 28, 2020
This article gives a brief overview of the most common commands for working with files and directories under the Linux system. The Linux edition used during this tutorial is Kali Linux. However, any Linux distribution can be used to practice the exercises presented in this post. Working with files and directories is an essential skill that any Linux or computer ...
Level 1 SOC Analyst - Unpacking the Interview
By: Garrett Wilson
December 24, 2020
Unpacking the Interview: Level 1 SOC Analyst Many companies have moved away from reactive, break/fix infosec frameworks to create security operations centers (SOCs) to combat increasingly adaptive threats and evolving attack vectors. These centralized cybersecurity efforts allow businesses to capture and correlate data across their organization — including network traffic volumes, application resource requests, and specific device behaviors — to ...
Types Of Cloud Certifications
By: Garrett Wilson
December 22, 2020
Up, Up and Away! Exploring Three Types of Cloud Certifications More companies are using the cloud — as noted by CIO, 96 percent of organizations now use some type of public, private, or hybrid cloud service to help streamline operations and boost IT impact. As a result, the cloud market is diversifying, with frontrunner Amazon now challenged by up-and-coming ...
An Unforgettable Trick to Remember the OSI Model 7 Layers
By: blahmed
December 22, 2020
The Open Systems Interconnection (OSI) Model is a conceptual model for describing a networking system's functions. It was initially developed by the International Organization for Standardization (ISO) in 1984. The OSI does not relate directly to any networking system; instead, it describes network architecture and allows different computer systems from various vendors to communicate and exchange data using standard protocols. ...
Unpacking the Interview: Penetration Tester
By: Garrett Wilson
December 21, 2020
Unpacking the Interview: Penetration Tester More than sixty percent of web applications are vulnerable to high- or critical-risk vulnerabilities outside the OWASP top 10 list. For companies, this creates a serious cybersecurity gap. If apps and services contain undetected weaknesses that hackers could exploit to compromise IT environments at scale-enterprises could find themselves dealing with massive data exfiltration or complete ...
How to Get A System Administrator Job
By: Garrett Wilson
December 16, 2020
What is a System Administrator? The system administrator career path is often considered a “stepping stone” for more advanced IT and infosec positions. It offers a host of learning and growth opportunities for passionate technology professionals. With an average starting salary of just over $60,000, work in systems administration helps set the stage for security analysis, incident forensics, penetration testing, ...
XSS Basics
By: Raymond Evans
December 15, 2020
What is XSS?: Cross-Site Scripting, aka XSS, is a vulnerability found on web pages that give attackers the ability to inject malicious scripts into ordinary sites. Attacking an XSS vulnerability can result in bypassing access controls, user information theft, and the ability to gain access to a victim's web browser. Often when a user has fallen victim to an XSS ...
Network Firewall: Most Frequently Asked Interview Questions
By: klowe
December 15, 2020
A network firewall is still considered the main security component in any network defense plan. A firewall is used to isolate internal networks from outside networks (e.g., the internet) and prevent malicious actors from accessing trusted networks. Firewalls are also used to protect individual endpoint devices from malicious software and misuse. They prevent endpoints from communicating with malware operators or ...
How to Dox
By: Jafar Hasan
December 9, 2020
This article is the second of a two-part series on Doxing. The first article can be found here. Doxing is essentially gathering sensitive information about a target that they generally wouldn't want or expect disclosed. These details include everything from their name, email address, ZIP code, and even home and work addresses. This article demonstrates some techniques to gather intelligence about ...
How To Learn IoT From Scratch
By: Michael Cunningham
December 9, 2020
Well, first, do your research. When researching, Google is your friend. Read articles about IoT and watch YouTube videos about it. Read more blogs about IoT. Do you have friends that work in the IT or telecommunication field? Don’t be afraid to ask them questions. For a focused approach, go to YouTube. Watch videos of the subjects required in IoT. ...