0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Hello, everyone. Lately, I have been working on a C project that happened to be dealing with a few tips regarding the optimization.I found some information surfing the net, so I studied the GCC documentation and several articles about the programming language and decided to share the tricks with you.I will try to be as clear as possible to avoid misunderstandings. To ...


What is IPtables? Iptables is a firewall that is usually built into Linux. Technically, IPtables is the interface for the kernel module Netfilter. In other words, IPtables resides in userspace and allows the user to enter firewall rules, and Netfilter is the kernel module that does the actual filtering.Before we get into actually setting up our firewall rules let's ...


Any search of the term ‘Cyber Security Skills Gap’ will return a laundry list of frightening facts about how far behind the industry is in terms of finding and hiring the needed professionals.Those with the desired skills will be able to command high salaries, among other benefits. But for managers seeking the dime a dozen talent, it’s a near impossible ...


The number of robocalls blasted out to American phones during each month in 2016 is estimated to have been 2.4 billion. That number would be high just for a single year, but when it occurs on a monthly basis, then things become insane. And this isn’t a recent development. The practice of robocalling has been around for a while, ...


About 3 months ago, I was sitting in yearbook class bored out of my mind. My work was done, and coolmathgames.com just wasn't doing it for me anymore. So, I decided to have some fun. I started with a question: "How could I take control of other student's computers?" I ran through what I knew about the workstations: ...


Please note, I am not a lawyer, and I am not offering any legal advice. This essay is simply the result of researching multiple sources and offering my best interpretations of the issues at hand. Please consult your attorney for any actual legal advice on the matter. The opinions represented in this ...


PART 1. HG8245H Huawei Router “Privilege Escalation”: Scenario: You have signed up for an internet connection and your ISP has provided you with a fancy router, SSID name, and password to be able to access the internet connection. For this PoC, we focus on the HG8245H router. I. First things first, the router credentials are already ...


Hello Cybrarians! I think all of you would be familiar with Mr. Robot, or at least know that it is a television series. Anyway, I noticed while watching Mr. Robot, that Eliot recognized an attack, name RUDY. RUDY stands for R U Dead Yet? It is a slow and low rate, application layer exploitation tool. When an attacker uses the ...


In the event that your Windows machine has been compromised or for any other reason, this cheat sheet is intended to help. This article is for Windows Administrators and security personnel to better execute a thorough examination of their framework (inside and out) keeping in mind the end goal is to search for indications of compromise. ...


Hi everyone,This is my first article on this site, I hope you will enjoy it! :)What I'm going to show you today is a simple C++ virus, or scam (whatever you want to call it), that is very annoying once opened and requires a system reboot in order to stop it.What it actually does is very simple to understand: ...