0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Email Bomber Script Using Python
By: Priyank Gada
November 9, 2016

I'd like to share this python script email bomber with you!  import smtplib#for SMTP Protocolimport mimetypes#converts URLimport sys#for Systemimport time#timefrom email.MIMEText import MIMETextclass SMTP(object):def title(self):print " PYTHON MAIL BOMBER IS WORKING :) " Then: def SMTPconnect(self):print "We are in the SMTPconnect"#list of SMTP server - https://www.e-eeasy.com/SMTPServerList.aspxself.smtpserver=raw_input("nEnter SMTP server: ")self.smtpport=input("Enter SMTP port (Usualy 25 or 465): ")try:self.mailServer = smtplib.SMTP(self.smtpserver,self.smtpport)except IOError, ...

Advanced Techniques in Juliar: Allow and Deny Commands
By: Rattar
November 9, 2016

Juliar programming language allows full customization, which means you can control which commands you can use and which are banned. Two commands that are essential to know: allowcommands and denycommands With allowcommands you can list which commands are allowed to be used.With denycommands you can ban commands which you don't wish to permit.If you want ...

Fetching a Website Using Juliar
By: Rattar
November 9, 2016

Hey guys,For this tutorial, you will need latest version of Juliar which can be downloaded at  https://www.juliar.org/downloads.ju Although using the import command is great, it lacks one feature: the ability to load a website.Now an old feature has been added back, you can now use fetch to fetch a URL. It's Easy So let's fetch google. In ...

Creating Secure Passwords with Two Pieces of Paper
By: ProgrammerE
November 9, 2016

This is a simple method to produce a completely secure password without having to memorize it: Open Excel. Copy this formula into cell A1 - T20: "=IF(ROUND(RAND(),0)=0,CHAR(RANDBETWEEN(65, 90)),CHAR(RANDBETWEEN(97, 122)))" (Without the quotes) This puts either a lower case or upper case letter in the cell, allowing for 26 2 = 52 different possible ...

10 Linux Distributions for Cyber Security Professionals
By: toxicptr
November 8, 2016

This is a list of Linux security distributions designed for hackers, pentesters, malware analyzers, reverse engineers, and other cyber security professionals. Kali Linux Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It is one of the most popular Linux security distributions. It's easy to update and ...

Using *Juliar* to Fool Webcam Hackers
By: Rattar
November 8, 2016

Hey, guys!Do you know that there are sites that allow you to take over a computer by remote control and even access the camera?You know this is disturbing behavior! Someone is looking at everything you do on your computer and on top of that he's watching you through the webcam while you're watching the screen.With the new Juliar ...

Hacking with Arduino: Build Your Own USB Payload
By: markpepapa
November 8, 2016

Arduino is an open-source project that created micro-controller based kits for building digital devices and interactive objects that can sense and control physical devices.Arduino boards are available commercially in preassembled form, or as do-it-yourself kits. Some of them are really small and have a built-in USB connector which makes sketch upload easier.Some of you may be thinking, how can ...

How to Copy Data with Rsync Via SSH
By: faildriller
November 8, 2016

I think rsync is a great tool for copying data and I would like to share some of the commands I use most frequently.Some of the information presented in this guide was copied directly from the rsync man pages.   Copying Data on a Local Machine: rsync -avHP /source/path/ /destination/path/  Flags ...

AI and Automating Incident Response
By: rcubed
November 8, 2016

Artificial Intelligence and Automating Incident Response Updated August 2018 Managing the sheer number of alerts that get raised by incident response systems on a monthly basis has reached the point of overwhelm in many organizations. For the most part, it’s reached the point where InfoSec professionals have been forced to dial back the ...

Biometric Verification as Identity Theft Protection-2
By: Immanuel V
November 8, 2016

My previous article on biometric verification raised an interesting concern with my readers: can 3D printing be used to copy fingerprints, creating an exploitable vulnerability?Here is the answer to that question:Fingerprints aren't the only means of biometric verification.There are several factors that can be used biometrically: Fingerprints Iris/Retina Scan Face ...