0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Statement: AM 200 points Now seriously, when it comes to listening to music, nothing is better than the radio ... well, maybe that's not completely true. Maybe we are too nostalgic. Format the answer: - Uppercase and lowercase as they appear in the flag - No spaces ...


From a recent investigation, a recent release of WordPress was found vulnerable to application defacement under "w4l3XzY3" hack.The following could be helpful in order to protect the application from this defacement.WordPress 4.7.2 was released two weeks ago, including a fix for a severe vulnerability in the WordPress REST API. In less than 48 hours after the vulnerability was disclosed, we saw ...


There are many resources that we can use in the process of generating a backdoor with Msfvenom, one of them is to encode a backdoor within an executable program. The content of this article is for didactic purposes, where the focus is the technique of putting our backdoor inside an executable (.exe), taking into account ...


#hacked "Hello, Freedom Hosting II, you've been hacked." That's the message visitors to any of the 10,000 affected websites that were a part of a Dark Web hack received recently. So, it seems Anonymous isn't afraid to pwn their peers. Talk about a very, very tangled web. The Dark Web ...


Intro Juliar.Future is the latest iteration of Juliar Programming Language. The compiler is built on top of JAVA, so everywhere JAVA can run, the compiler can run. This is a huge step we've taken to eliminate having to build a compiler for each version. ...


Picking up the thread from a previous post on structured software design and CASE, it’s worth examining some of the major development methodologies and their evolution. Where SA/SD and CASE deal with the process of designing and creating software products, methodologies are concerned with the process of getting them built. They exist within the realm ...


Hello, Cybrarians! Today we will continue our discussion about Security, as mentioned in Introduction to Computer Science Security , math is the core of security, and as I promised I will try to make this part as simple as possible. Before we start our discussion, I'd like to mention that during this tutorial, you ...


You turn on the evening news and a breaking report flashes, “Major Data Breach of Huge Corporation, details at 11” and you immediately begin to question, “could this happen to my organization?” In the wrong hands, privileged accounts represent the biggest threat to enterprises and unfortunately are a reality for many companies who are not exercising the right precautions.According to ...


Breaches. Breaches. In the past two years, we have read, witnessed or even been affected by attacks even on some fortune 500 companies. The attacks have become sophisticated, notorious and devastating. This calls for advanced blue team efforts which should be focused and relentless. For all we know, the attacker is always ahead.Most companies I have interactions with have ...


One of my challenges during my tenure in college was the discovery of new and creative ways to make learning and retention easier for myself. I made note of the positive effects of activities which created reinforcement, and a sense of confidence over the subject matter. Eventually, I observed that hands-on interaction during events such ...