0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Today, I will present a random MAC address generator tool written in Python. This code is for educational purposes and you can test this code and learn more about Python programming.MAC is an acronym for Media Access Control address and is a unique identifier assigned to network interfaces (e.g: NIC cards) for communications at the data link layer of a ...


Linux has grown into an industry-leading software and service delivery platform that is used for everything from super computers and Web servers to virtualized systems and your Android phone, meaning you will find many IT careers in the current market require these skills. The CompTIA LX0-104 Linux+ certification exam delves specifically into “applications, scripting, and security. This exam covers ...


How to Solve "MS Outlook Not Responding" Error or Outlook Freezes When Opening a File or Sending Mail Receiving ‘Outlook Not Responding’ error can be annoying when you try to open an item or send an email message in Outlook 2010 or higher version. The users also experience frequent Outlook freezes while performing such activities. This error may ...


As Cybrarians may or may not have noticed, Cybrary has entered an accelerated, high-growth phase. In addition to changes across the site, including the new offerings of various vendor products in the catalog, Cybrary has also begun to expand the team.[caption id="attachment_96849" align="alignleft" width="219"] Jeff Man, INFOSEC Curmudgeon & Cyber Security Evangelist[/caption]The newest addition ...


According to Heimdal Security, “Hacktivism accounts for half of the cyberattacks launched in the world.” What is hacktivism? Hacktivism is a politically or socially motivated form of hacking. Deeply rooted in hacker culture and ethics, it is often related to free speech, human rights, or freedom of information. Although hacktivism may seem positive, ...


This time I will present you here a source code made in Python which you can download a file with multiple threads option. This source code is for educational purposes and I hope is helpful to you. If you find any bugs in this code or have questions, leave a message in the comments section. `#!/usr/bin/env python#coding=utf-8import osimport sysimport ...


#hacked Blackmail is coming. In a bizarre string of events, HBO hit show Game of Thrones is at the center of breaches and episode leaks, among other pieces to this growing hacker's puzzle. Initially, unknown hackers claimed to have 1.5 terabytes of data from HBO and leaked that information in two batches ...


How to connect a Router/Firewall that is running on GNS3 VM to a host machine. Have you ever wondered how to connect your simulated device (Router/Firewall) on GNS3 VM to host machine so that you can pull/push the configuration from/to the device? Here is the solution: 1. You have to add one loopback adapter to your host ...


According to CompTIA, the Linux+ certification offers a framework for acquiring working knowledge of Linux for IT professionals working as junior-level system administrators, as well as those working in Web and software development.Successful candidates will have the following skills: Work at the Linux command line Perform easy maintenance tasks including assisting users, ...


Today I am going to give you some tools to explore the Footprinting and Reconnaissance . For the new people on this long trip, enjoy the ride and good luck on your studies! For questions or help on how to use these tools, I will be glad to help you so feel free to contact me anytime. 1) ...