0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Artificial Intelligence In The Cyber Domain
By: james8
October 14, 2016

While it’s true that there is a growing need to fill the cyber workforce with human talent, artificial intelligence will play a vital role in the future. This notion often reminds me of the movie the Matrix where a cyber intelligence is self-aware. However, this is a highly exaggerated and fictional scenario.Automating what can be done with incident response ...

To root or not to root your Android device
By: m0yP
October 14, 2016

So here we are, close to Android 7, or N (for Nougat)'s release. The biggest mobile platform in the world (1.4+ billion users) with Google's new mobile operating system.First of all, let me clarify something: this will not be a how-to guide, I won't try to convince anyone to root or not to root their device, nor I ...

Forge and Sniff Packets Using scapy for Python
By: prometheus
October 14, 2016

Hello, and welcome again! Scapy is one of the powerful packet manipulator and decoder libraries for Python.  Scapy is used for forging and manipulating packets through python and can also be used as an alternative to carrying out a few functionalities provided by popular Wireshark and Nmap.In this article lets see how to use few basic functionalities of ...

Workarounds for Chrome
By: lemmycv
October 14, 2016

Google Chrome is a great browser when it comes to responsiveness and speed but at the sacrifice of memory. I personally love to make sure my computers are running as lean as possible and I wondered if I could do the same with chrome. Lo and behold, there are ways to speed up your browsing. ...

Practical Social Engineering Tactics
By: MohammadYahya
October 13, 2016

Attackers know that hacking a WiFi key is just a temporary thing. Maybe they think, why not hack the entire connection instead? Well, here are some basic "tried and true" social engineering tactics that actually work, and you should be aware of. Don't get taken advantage of by these simple actions. 1. The Cold Call:  On hacking something, port ...

Rule/Behavior Based Payment Authentication
By: Niyaz
October 13, 2016

The world is rapidly evolving with technology inventions. Many of such advancements are happening in the payment industry. In the 90s, no one would have believed using mobile phones to make payments for day to day shopping,  but the fact is, it is happening now. The time is very near when no one will ...

CIA Triad: Easy as ABC
By: infosectdk
October 13, 2016

Does everyone know what CIA means?Well I hope you do.There are lots of acronyms, and often they have different meanings in different settings.WTF can mean Web Threat Framework, from a data management view it can also mean “Where’s the file?” and of course there is that other meaning, which I don’t need to elaborate on.But ...

Cybercrime and the Gaming Industry
By: rcubed
October 13, 2016

Groups with ominous-sounding names such as Lizard Squad, Team Poison, and the Armada Collective are making a virtual killing from cybercrime. But the attack surfaces they target aren’t what you may have come to expect. Rather than going after financial and banking platforms where more challenging safeguards and harsher penalties are in place, these enterprising cybercriminals are ...

Key Management and its Relationship to Cryptography: SDA
By: iheonufrank
October 13, 2016

Key Management and Relationship to Cryptography: Part I | SDA I learned a lot from the Cryptography course so I decided to share with other Cybrary users how it relates to my field in the payment industry using ICCs (Integrated Circuit Cards). SDA stands ...

A Mathematical Introduction to Logic: How Logic Provides a Foundation for Hacking
By: ProgrammerE
October 13, 2016

Like any other profession, hacking has both practical and theoretical applications. Most of the Open topics deal with the practical side of hacking, so I thought I could help balance that a little by talking about the theoretical side of hacking.I am going to vastly simplify the material in my third year mathematics course "A mathematical introduction to logic" ...