0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Network Programming with Socket in Python
By: HEGA GEOFFROY
November 18, 2017

Socket Programming is a running process between computers. The process is accomplished by the communication. Generally, internet communication is the best way for communication. The implementation of this process is done with the API (Application Programming Interface) to communicate with the protocol stack.A protocol stack is TCP. UDP protocols are the combination of IP addresses, and a port protocol is ...

Hope vs. Expectation: Adapting to End User Behavior
By: Ridiahshost
November 17, 2017

There is a prevalent paradigm within the organizational cultures of many well-meaning institutions that seems to have left open an opportunity for improvement. For many people, the tired axioms of security awareness training have resulted in a devaluation of training and made less realistic the possibility of creating a security-minded culture within the workplace, as well as in our ...

UNM4SK3D: CIA, Microsoft, and IoT
By: Olivia
November 17, 2017

#wikileaks Just when the world thought Wikileaks might just stop dripping, the whistle-blower forum resumed their old ways, this time releasing source code and analysis of CIA hacking tools dubbed 'Vault 8.'  You may recall that beginning in March of last year, Wikileaks began releasing formerly confidential CIA documents under the name 'Vault 7,' ...

Beware the 'Paypai' Scam
By: prezzio
November 11, 2017

These days, we might receive a well-written email which is not so easy for a "common user" to identify and mark a message as a threat... PayPal users should pay attention to the email message with the subject: "Your PayPaI account has been Limited until we hear from you" is fake ...

UNM4SK3D: Tor, Facebook, and MantisTek
By: Olivia
November 10, 2017

#vulnerability The 'TorMoil' vulnerability has been wreaking havoc for Mac and Linux users of the anonymity browser by leaking their real IP addresses. That is, until a patch was released 11/03 for browser version 7.0.8 Want the good news first? Windows users running Tor Browser 7.0.8 were not affected and the patch is in an upgrade ...

How Not Knowing the Mirai Botnet Makes You a Rookie
By: Aman2406
November 9, 2017

Internet of things is currently one of the best technologies available to mankind. It is really helpful in reshaping the world and its future. Many Tech-giants are even moving into this field, whereas many start-ups are growing up making IoT their agenda. Everyone is thinking about making the world better and making people’s lives easier than now. ...

MS Visual Studio Code: Your Guide to Git
By: Jawady Muhammad Habib
November 8, 2017

Hello, guys!This is Muhammad Habib Jawady. Today I will demonstrate how to use MS Visual Studio Code in order to properly work with Git. This will be a hands-on tutorial that I hope you find useful. The number of users of ‘Code’ has grown dramatically throughout the year, and the need for a full tutorial on how to ...

4 Planning Steps for Course Building on Cybrary
By: ginasilvertree
November 7, 2017

I decided to submit a course through the Course Builder on Cybrary today (located under the "Teach" menu on the top navigation). I found the submission tool to be very clean, straight-forward and easy to use. It took less than 10 minutes to submit my content, which was short and pre-written. I still need to record my ...

Cryptology 101
By: Jawady Muhammad Habib
November 7, 2017

Neal Stephenson said in a novel of his called Cryptonomicon:“How long do you want these messages to remain secret?[…] I want them to remain secret for as long as men are capable of evil.”One cannot underestimate the importance of cryptology nowadays. As the need for studying and implementing secure communication techniques rise, in the ...

InfoSec Cheat Sheets
By: RachidOubaoug
November 5, 2017

Reverse Engineering: https://www.cybrary.it/wp-content/uploads/2017/11/cheat-sheet-reverse-v6.png Linux commands: https://linoxide.com/images/linux-cheat-sheet-612x792.png Penetration Testing: https://highon.coffee/blog/cheat-sheet/ SQL Injection: http://pentestmonkey.net/category/cheat-sheet/sql-injection NMAP: Professor Messer+s Quick Reference Guide to NMAP Hacker Target: Nmap Cheat Sheet XSS: ...