0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Introduction to the IPtables Command
By: lscianni
March 29, 2017

What is IPtables? Iptables is a firewall that is usually built into Linux. Technically, IPtables is the interface for the kernel module Netfilter. In other words, IPtables resides in userspace and allows the user to enter firewall rules, and Netfilter is the kernel module that does the actual filtering.Before we get into actually setting up our firewall rules let's ...

Closing the Cyber Security Skills Gap
By: Olivia
March 28, 2017

Any search of the term ‘Cyber Security Skills Gap’ will return a laundry list of frightening facts about how far behind the industry is in terms of finding and hiring the needed professionals.Those with the desired skills will be able to command high salaries, among other benefits. But for managers seeking the dime a dozen talent, it’s a near impossible ...

Robocalling for Dollars – a phish by another name
By: rcubed
March 28, 2017

The number of robocalls blasted out to American phones during each month in 2016 is estimated to have been 2.4 billion. That number would be high just for a single year, but when it occurs on a monthly basis, then things become insane. And this isn’t a recent development. The practice of robocalling has been around for a while, ...

How I Became the High School Networking Master (Hacking School Computers)
By: Av3ng3r
March 28, 2017

About 3 months ago, I was sitting in yearbook class bored out of my mind. My work was done, and coolmathgames.com just wasn't doing it for me anymore. So, I decided to have some fun. I started with a question: "How could I take control of other student's computers?" I ran through what I knew about the workstations: ...

The Legal Significance of Encryption
By: terrabitz
March 28, 2017

Please note, I am not a lawyer, and I am not offering any legal advice. This essay is simply the result of researching multiple sources and offering my best interpretations of the issues at hand. Please consult your attorney for any actual legal advice on the matter. The opinions represented in this ...

Router Vulns: Impacts & Recommendations Part 1 - PoC
By: Alfie
March 27, 2017

PART 1. HG8245H Huawei Router “Privilege Escalation”: Scenario:  You have signed up for an internet connection and your ISP has provided you with a fancy router, SSID name, and password to be able to access the internet connection. For this PoC, we focus on the HG8245H router. I. First things first, the router credentials are already ...

R.U.D.Y.
By: bachan
March 27, 2017

Hello Cybrarians! I think all of you would be familiar with Mr. Robot, or at least know that it is a television series. Anyway, I noticed while watching Mr. Robot, that Eliot recognized an attack, name RUDY. RUDY stands for R U Dead Yet? It is a slow and low rate, application layer exploitation tool. When an attacker uses the ...

A Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection
By: gurubaran
March 26, 2017

In the event that your Windows machine has been compromised or for any other reason, this cheat sheet is intended to help. This article is for Windows Administrators and security personnel to better execute a thorough examination of their framework (inside and out) keeping in mind the end goal is to search for indications of compromise. ...

Basic C++ "Virus"
By: lc5273
March 25, 2017

Hi everyone,This is my first article on this site, I hope you will enjoy it! :)What I'm going to show you today is a simple C++ virus, or scam (whatever you want to call it), that is very annoying once opened and requires a system reboot in order to stop it.What it actually does is very simple to understand: ...

UNM4SK3D: CIA, Apple, and TSA
By: Olivia
March 24, 2017

#wikileaks (again). Dark Matter may sound like a new sci-fi movie, but it's actually the latest of the WikiLeaks Vault 7 classified documents shared with the public.These new documents, which build off of this month's previous leak, describe specifically how the CIA monitors Apple devices.  Developed by a special division of the CIA ...