0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Tutorial: Book Search Perl Application Code
By: Bmsr256
September 18, 2017

Today, I want to show you a book search source code written in Perl. Perl is a very useful and powerful programming language like Python, except Perl still remains on lots of Unix-like operating systems.This application searches for information on some web sites. I put Wikipedia, but you can change this with whatever you want. The code is posted ...

Windows 10: Securing the Boot Process
By: Mike Ship
September 18, 2017

                           Windows 10: Securing the Boot Process An operating system’s principal function is to provide a safe execution environment in which users’ programs run. This requires a basic framework for uniform program execution with a uniform and standardized way to use the hardware ...

Your Complete Guide to Raspberry Pi
By: Olivia
September 16, 2017

What is Raspberry Pi? Raspberry Pi is a small computer that costs between $5 and $35, but can function as a desktop computer or be used for additional functions, such as building smart devices. Originally, the Pi was intended for usage in schools as a method of increasing interest in computers among children and ...

UNM4SK3D: Equifax, Bluetooth, and Zerodium
By: Olivia
September 15, 2017

#hacked- big time.   Chances are you've heard about the Equifax breach, which led to the compromise of 143 million US consumer's data including the names, social security numbers, dates of birth, addresses, and in some cases, drivers license numbers. In the wake of the breach, we've heard stories of corrupt Equifax executives ...

Protect Your Network by "Thinking Like a Thief"
By: Bob
September 15, 2017

Protect  your network system: Kenya, like any other developed nation, is faced with increasing cyber security threats targeting core business functions for both the government and the private sector. Recent attacks on  Kenyan Banks, the Government tax collector, the IEBC systems, the rise of cyber bullying and the recent global attack by WannaCry ransomware, surely ...

Encryption is Everywhere
By: ginasilvertree
September 14, 2017

Encryption is everywhere (well, almost everywhere) around sensitive data in motion and, sometimes, sensitive data at rest. Without it, e-commerce transactions, government secrets and electronic medical records - and many other types of data - could not safely exist. Data is a precious resource in the electronic economy and, like every precious resource, it needs perpetual protection.As a member ...

3 Ways to Increase Office-365 Security
By: Sasha Radenovic
September 14, 2017

Cloud services are gaining popularity for some time, and one of the most popular office cloud services is Office 365, especially with SMB companies, and their main concern is security. Most of those companies do not have an Information Security Officer ( CISO ), just basic IT staff for administration and network issues. Microsoft's product and service set ...

Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks
By: BALAJI N
September 14, 2017

In this Kali Linux Tutorial, we are to work with Xerosploit. Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do DOS attacks and port filtering.We can use this tool to perform DOS, MITM attacks, also the ...

Cloud Access Security vs Cloud Application Security
By: zerge
September 14, 2017

First, we need to differentiate between the public cloud and the private cloud: So, basically, the public cloud consists of cloud applications such as Office 365, Google Suite, Box.com, Dropbox, Salesforce, ServiceNow, etc. There are literally tens of thousands of cloud applications available. We call this Software as a Service (SaaS).On the other hand, a private cloud is when ...

How to Create a Netcat Replacement – Python Part 1
By: Jawady Muhammad Habib
September 13, 2017

Introduction: Netcat is the Swiss army knife when it comes to TCP/IP, a utility used to open network connections commonly integrated into a wide range of apps. Because of the ease of its adaptability and high performance, it exists in several operating systems as command line service to know the status of ports (the case of ...