0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Robocalling for Dollars – a phish by another name
By: rcubed
March 28, 2017

The number of robocalls blasted out to American phones during each month in 2016 is estimated to have been 2.4 billion. That number would be high just for a single year, but when it occurs on a monthly basis, then things become insane. And this isn’t a recent development. The practice of robocalling has been around for a while, ...

How I Became the High School Networking Master (Hacking School Computers)
By: Av3ng3r
March 28, 2017

About 3 months ago, I was sitting in yearbook class bored out of my mind. My work was done, and coolmathgames.com just wasn't doing it for me anymore. So, I decided to have some fun. I started with a question: "How could I take control of other student's computers?" I ran through what I knew about the workstations: ...

The Legal Significance of Encryption
By: terrabitz
March 28, 2017

Please note, I am not a lawyer, and I am not offering any legal advice. This essay is simply the result of researching multiple sources and offering my best interpretations of the issues at hand. Please consult your attorney for any actual legal advice on the matter. The opinions represented in this ...

Router Vulns: Impacts & Recommendations Part 1 - PoC
By: Alfie
March 27, 2017

PART 1. HG8245H Huawei Router “Privilege Escalation”: Scenario:  You have signed up for an internet connection and your ISP has provided you with a fancy router, SSID name, and password to be able to access the internet connection. For this PoC, we focus on the HG8245H router. I. First things first, the router credentials are already ...

R.U.D.Y.
By: bachan
March 27, 2017

Hello Cybrarians! I think all of you would be familiar with Mr. Robot, or at least know that it is a television series. Anyway, I noticed while watching Mr. Robot, that Eliot recognized an attack, name RUDY. RUDY stands for R U Dead Yet? It is a slow and low rate, application layer exploitation tool. When an attacker uses the ...

A Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection
By: gurubaran
March 26, 2017

In the event that your Windows machine has been compromised or for any other reason, this cheat sheet is intended to help. This article is for Windows Administrators and security personnel to better execute a thorough examination of their framework (inside and out) keeping in mind the end goal is to search for indications of compromise. ...

Basic C++ "Virus"
By: lc5273
March 25, 2017

Hi everyone,This is my first article on this site, I hope you will enjoy it! :)What I'm going to show you today is a simple C++ virus, or scam (whatever you want to call it), that is very annoying once opened and requires a system reboot in order to stop it.What it actually does is very simple to understand: ...

UNM4SK3D: CIA, Apple, and TSA
By: Olivia
March 24, 2017

#wikileaks (again). Dark Matter may sound like a new sci-fi movie, but it's actually the latest of the WikiLeaks Vault 7 classified documents shared with the public.These new documents, which build off of this month's previous leak, describe specifically how the CIA monitors Apple devices.  Developed by a special division of the CIA ...

Matrix Ransomware Is on the Rise
By: David Balaban
March 24, 2017

Matrix ransomware holds computer data encrypted for ransom. The users concerned learn about the attack from a file dubbed Readme-matrix.rtf. The file is a ransom note dropped to any folder which files the ransomware has encrypted. To ensure the victims actually read the message, the ransomware also drops its instance on the Desktop and changes the background ...

CIA Vault 7 Vulnerabilities in Anti-Virus Solutions
By: B14Ck0R4C13
March 24, 2017

Hi Everyone, This is my first article for the 0P3N Knowledgebase, and what an eye-opener. The more you go into these documents the more you understand just how bad this leak really was. The tools they use I never even knew existed. Anyway, enjoy the article and comment on what you think of WikiLeaks CIA Vault 7. ...