0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


#wikileaks (again). Dark Matter may sound like a new sci-fi movie, but it's actually the latest of the WikiLeaks Vault 7 classified documents shared with the public.These new documents, which build off of this month's previous leak, describe specifically how the CIA monitors Apple devices. Developed by a special division of the CIA ...


Matrix ransomware holds computer data encrypted for ransom. The users concerned learn about the attack from a file dubbed Readme-matrix.rtf. The file is a ransom note dropped to any folder which files the ransomware has encrypted. To ensure the victims actually read the message, the ransomware also drops its instance on the Desktop and changes the background ...


Hi Everyone, This is my first article for the 0P3N Knowledgebase, and what an eye-opener. The more you go into these documents the more you understand just how bad this leak really was. The tools they use I never even knew existed. Anyway, enjoy the article and comment on what you think of WikiLeaks CIA Vault 7. ...


Last year (2016) turned out to be a banner year for phishing. According to APWG (Anti-Phishing Working Group) , the total number of phishing attacks in 2016 was 1,220,523, a 65% increase over 2015. In the fourth quarter of 2016, APWG saw an average of 92,564 phishing attacks per month, an increase of 5,753% over 12 years. If ...


As the Cybrary site continues to change, and trust me when I say there are many changes coming (good ones!), the Micro Certification catalog will only continue to expand.In my recent post, I mentioned more certifications geared toward specific vulnerabilities would be coming soon, but in addition to that, we are drawing-in expertise from industry leader’s to ...
![[Part 1]$~Metasploit for Beginners](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Hello, everyone! Let me first introduce myself. My name is Spirited Wolf and I love to share my knowledge with everyone and anyone who needs it. You can contact me on Cybrary or on my Facebook . Now, let's get started. What ...
![Kali Linux For Ethical Hacking Part 1a & 1b [Video Series]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Part 1a: Info Gather with DMITRY Lab (published 2/16/2017) Hello everyone. I'd like to give a warm welcome to beginners who are trying to roll with Kali Linux Tools for Ethical Hacking. Here is my next series for those of you who are thinking about starting Ethical Hacking Labs with tools available in Kali Linux. This is a video ...


It's 2017 and traditional Antivirus solutions are becoming more and more obsolete with every passing day. The rise of exploit kits and "do it yourself malware" means that organizations can no longer rely solely on Antivirus solutions to keep them safe. In fact, someone with little experience can now make a unique piece of malware that is capable of ...


Nmap - Network Mapper Network Mapper is an open source and a very versatile tool for Linux system/network administrators. Nmap is used for exploring networks, perform security scans, network audit and finding open ports on a remote machine. It scans for Live hosts, Operating systems, packet filters and open ports running on remote hosts. OPHCRACK- Windows ...


In this post, I will show you some Unix shell scripts to automatically work with FTP servers. These are scripts that FTP to a remote server and then close the FTP connection to that server when the file has been transferred.These are the shellcodes for those three script files. CODE: Execute_FTP.sh ./Parser.sh 10.132.207.2 username password /home/cybrary/Documents/OUT DiskAlert.txt /tmp/Alert/VDS ...