0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Necessity of HIPAA Compliance Services
By: ankitashukla
May 1, 2017

Our act of HIPAA was passed into law in 1996, whose purpose was to create a national standard for giving due protection to the privacy of personal health information. The law has been intended to provide shelter to health information by simply establishing transaction standards. Those standards have been set for the exchange of health ...

Budgeting Analysis
By: themindandbeauty
April 30, 2017

It is the budgeting which represents these resources providing investments and these investments consumed within organizations. It includes two ways; obtaining investments and using them. It is the budgeting which includes the destination of avenues and expenses. It represents two values; the plans and objectives. Budgeting standard; converting objectives to numbers. Budgeting content; the destination ...

WiFi PineApple
By: bachan
April 30, 2017

Hello Cybrarians,If you are reading this post then you are just awesome and very inquisitive. You probably like learning new information about the hardware devices that every hacker wants to use.Let's jump right in and get started. WiFi Pineapple It is a unique device used to make penetration testing easier. The WiFi Pineapple is Pine access point, an advanced suite ...

InfectPE - Inject Custom Code into PE File
By: Jimakoch
April 29, 2017

Using this tool you can inject x-code/shellcode into PE file. InjectPE works only with 32-bit executable files. Why you need InjectPE? You can test your security products. Use in a phishing campaign. Learn how PE injection works. ...and so on. ...

Fake Image Exploiter Framework -The "Noob" Friendly Function
By: spiritedwolf
April 29, 2017

Hello everyone,I'm SpiritedWolf as you all [may] know and I am uploading something after a long while because I was busy with this thing called "life" :)Anyway, here is my video tutorial: Today we are going to discuss one more awesome framework from the SSA team, i.e FakeImageExploiter.----------------------------------------CodeName: MetamorphosisVersion release: v1.3 (Stable)Author: Pedro ubuntu [ r00t-3xp10it ]Distros Supported: Linux Ubuntu, ...

UNM4SK3D: FCC, Air Force and Hajime
By: Olivia
April 28, 2017

#netneutrality We've quoted Eminem before, and we'll quote him again. 'The FCC won't let me be.' And this time we mean it. Now, after recent changes to privacy rules, FCC chairman Ajit Pai has announced the first move in efforts to kill off Net Neutrality. Before we get too ahead ...

Bruteforce Login-page Using Hydra and Python Script (DVWA)
By: an0th3rhuman
April 28, 2017

What is DVWA? Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a ...

Creating a post with Juliar
By: Rattar
April 27, 2017

Hello Cybrarians,Today we will be creating a program that stores name into a variable and prints it out!We will be using the new built-in editor for Juliar! You can download the latest version of Juliar from here:  https://juliar.org/downloads.php  First, you want to double-click the jar file to run. An editor should then pop up!Go to File -> NewThis will ...

The "Hell" of an Unsolicited Phone Call
By: njbaker7
April 27, 2017

Just knowing that the notion of a simple three letter word could wreak havoc in my life is scary beyond anything imaginable. I am speaking of a simple “Yes”. Getting a call from an unsolicited number has me screening my calls more than ever before. My thought now is, if it is that important the caller ...

Breaking into the Cybersecurity Field
By: Derek Carlin
April 27, 2017

“I want to get into Cybersecurity, where do I start?” With an estimated One Million job openings in Cybersecurity in 2017 and a shortage of talent, it is easy to see why so many people are drawn to the field. I myself made the switch from traditional IT to the Cybersecurity field within the last year, and when ...