0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Download an Image Using Python
By: rk
January 23, 2017

Estimated reading time: 1 minute Hello, everyone.Today I will show you how to use Python to download any image from the web.First, let's take a look at a script that I will explain what each statement is doing. import urllib.request import random def downloader (imageurl): filename = random.randrange( 1 ...

SecurityOnion 1st Time Configuration and Set-Up
By: Meta
January 23, 2017

Estimated reading time: 2.5 minutes Loading and setting up SecurityOnion This tutorial is intended mostly for beginners or anyone who wants to set up their first network monitoring device with some pre-configured tools to test out but anyone is free to use it.Security Onion is a Linux distro for intrusion detection, network security ...

Kepler Architecture
By: bachan
January 22, 2017

What's up Cybrarians?Hope you're all doing well since my last post! Today, I want to tell you about the architecture of the GPGPU that most of us may be using in our graphics cards.As we all know, NVIDIA is the giant in the field of graphics cards and high-performance computing. The most common architectures used by NVIDIA are Fermi, Kepler, Maxwell ...

Building a Linux Monitoring Infrastructure With Nagios 3.0
By: Abayomi Ayoola
January 21, 2017

Estimated reading time: 3 minutes This post describes the installation and configuration of a system's monitoring infrastructure on Nagios, an open source network monitoring application. This is the first in two series. Enjoy! Nagios is an open source infrastructure system and enterprise network monitoring application. It monitors hosts and services, ...

This Day in History: What makes the world go 'round?
By: Tatianna
January 21, 2017

  Have you ever stopped to think about historic events or "history" as a whole? It can be overwhelming to realize that so much happens every day. If you think harder, there are 24 hours in a day [duh] (that's 1440 minutes if you want to get specific), and ...

UNM4SK3D: Anonymous, Apple and the Army
By: Olivia
January 20, 2017

  #threats Today, January 20, 2016 the 45th President of the United States, Donald Trump, will be sworn into office. While many opinions surround the recent election and overall political landscape, none have been more threatening than those from the collective group Anonymous.  Prior to the election, Anonymous vowed to take Trump down, ...

THC: Introduction to Tunisian Hybrid Car
By: supertnx123
January 20, 2017

Estimated reading time: 5 minutes Project description: The project is a robot vehicle to be precisely based on an Arduino core ( Arduino UNO) and carrying a Raspberrian independent system for memory consuming operations, and equipped with various tools for environment recon and pen-testing (GPS/ real-time positioning/live streaming, ...

Tutorial: One Shot Passive Discovery
By: H5p
January 20, 2017

Estimated reading time: 1.5 minutes When preparing for a penetration test, step one: Gather the information.Let's collect the information about the target by digging what is already available on the internet.  You may do Google search, whois, traceroute, advanced Googling and other stuff but let's kill this with one shot. I have found a cool script which can come ...

[PODCAST] Minicast Episode 8 The one about ransom and privacy
By: CyDefe
January 19, 2017

Hey hey everyone we've published another podcast this month. On this episode we talk about Microsoft's new privacy dashboard, and a lot of ransom happening in the cyber world. You can listen to our podcast on CyDefe.com, watch our raw video at https://www.twitch.tv/cydefe. Story Links https://www.securityweek.com/microsoft-launches-privacy-dashboard http://thehackernews.com/2017/01/mongodb-database-security.html?m=1 ...

Risk Management: The what, the how, and next steps in advancing your cyber career
By: Olivia
January 19, 2017

When we talk about cybersecurity, for the most part, we are talking about the protection of systems and information from threat vectors such as: cyber espionage, cyber warfare, cyber terrorism, cyber negligence (looking at you Sony). In their most troublesome form, these threats take aim or point at military, secret, political, or infrastructure assets of a country and its people. ...