0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Tax Refund Scams: Benefits to filing early and often
By: rcubed
February 7, 2017

The two constants of the universe are death and taxes, however, advancements in life extension and anti-aging research threaten to up end the former. Taxes are eternal and in some cases, literally. Estates and heirs are often hounded by the IRS for the tax obligations of the deceased. In the event that death is eventually knocked from ...

CTF Insomnihacking Teaser 2017 Challenge Write-up
By: Motasem
February 7, 2017

This challenge requires skills both in exploit development, reverse engineering and writing scripts using python. In this challenge we got a file named“baby-6971f0aeb454444a72cb5b7ac92524cd945812c2.tgz”After extracting this file we’ll be presented with two files; “baby” and “libc.so”. Our targeted file that we’re required to exploit is “baby”. As we get used to doing when analyzing and reversing binaries and files especially ...

HIPAA Covered Entities are Still on their Heels.
By: mkuntz2
February 7, 2017

  Estimated reading time: 2 minutes The Healthcare industry in the US as a whole is still on its heels when reacting to cyber security issues and the lack of industry standardization is not helping business decision makers manage this aspect of their business. A lack of industry standardization ...

5 Ways Virtual Reality is Impacting Your Life
By: GWCitroner
February 6, 2017

Virtual reality has come a long way from the first primitive 3D viewers .  This technology is now poised to change the way we learn, communicate, travel, and receive medical care.Here are 5 big ways virtual reality is enriching our lives. Education  The world is your classroom when you use virtual reality; why look at ...

Tutorial: Domain Password Auditing
By: FelixTrips
February 6, 2017

Estimated reading time: 3 minutes Summary: This tutorial is for password auditing of network credentials within your domain. We will use Kali Linux along with some open source software to validate your password policies. As always make sure you have permission to perform this audit at the least every everyone should check to verify that people using ...

"Apple" Phishing Email
By: Fearghal
February 5, 2017

Estimated reading time: 2 minutes Something interesting you might not know is "Apple's" phishing email. There are a number of different emails claiming to be from Apple being sent to people. Let's say that someone signed into your iCloud or Facetime account and gave you a link to follow. ...

Android Development - These are the droids you're looking for ...
By: Rachel Laura M
February 5, 2017

Android is the Google platform billions of people use on their smartphones.  The origins of Android began in 2006, around the same time that Apple denied it was creating the now ever-popular iPhone. Compact laptops were the hot new item and the tablets of the day looked like a laptop sans keyboard. The smartphones back then were Blackberries and ...

How to Test Webserver Availability using Python
By: klowe
February 4, 2017

Hello Cybrary Community, Today I’ll show you how to test the availability of a webserver  using  Python: Let’s start writing our script. import socket, sys if len(sys.argv) != 2:     print >>sys.stderr, 'usage: python test_webserver.py <www.example.com>' ...

Introduction To Computer Science Security
By: xorinsomnia
February 3, 2017

Introduction to Computer Science Security Tutorial Estimated reading time: 2 minutes Welcome to this crash course on security. My aim for this tutorial is to fill the gap between the academic courses (knowledge) part and real life scenario (practical) part. My motivation for doing this tutorial is based on personal issues I ...

UNM4SK3D: Executive Order, Take-Two, and Facebook
By: Olivia
February 3, 2017

#cyberpolicy You've heard of the 12 days of Christmas, now post- holiday we're looking at 60 days of cyber. An Executive Order draft reveals the White House will be calling for swift review of “national security systems” within 60 days of the order being signed. During this time, President Trump says he will "ask ...