0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

CTF Mugardos 2015 Writeup – Stego200
February 13, 2017

Statement:  AM 200 points Now seriously, when it comes to listening to music, nothing is better than the radio ... well, maybe that's not completely true. Maybe we are too nostalgic. Format the answer: - Uppercase and lowercase as they appear in the flag - No spaces ...

The WordPress "w4l3XzY3" Hack
By: sranjanbehera
February 10, 2017

From a recent investigation, a recent release of WordPress was found vulnerable to application defacement under "w4l3XzY3" hack.The following could be helpful in order to protect the application from this defacement.WordPress 4.7.2 was released two weeks ago, including a fix for a severe vulnerability in the WordPress REST API. In less than 48 hours after the vulnerability was disclosed, we saw ...

Putting a Backdoor On Executable Files
By: Fabrício Salomão
February 10, 2017

There are many resources that we can use in the process of generating a backdoor with Msfvenom, one of them is to encode a backdoor within an executable program. The content of this article is for didactic purposes, where the focus is the technique of putting our backdoor inside an executable (.exe), taking into account ...

UNM4SK3D: Dark Net, Vizio, and Homeland Security
By: Olivia
February 10, 2017

#hacked "Hello, Freedom Hosting II, you've been hacked." That's the message visitors to any of the 10,000 affected websites that were a part of a Dark Web hack received recently. So, it seems Anonymous isn't afraid to pwn their peers. Talk about a very, very tangled web. The Dark Web ...

Juliar Overview
By: Rattar
February 9, 2017

Intro Juliar.Future is the latest iteration of Juliar Programming Language. The compiler is built on top of JAVA, so everywhere JAVA can run, the compiler can run.  This is a huge step we've taken to eliminate having to build a compiler for each version. ...

Software Development Methodologies: Tumbling down the waterfall
By: rcubed
February 9, 2017

Picking up the thread from a previous post on structured software design and CASE, it’s worth examining some of the major development methodologies and their evolution. Where SA/SD and CASE deal with the process of designing and creating software products, methodologies are concerned with the process of getting them built. They exist within the realm ...

Tutorial: Math For Computer Science Security
By: xorinsomnia
February 9, 2017

Hello, Cybrarians! Today we will continue our discussion about Security, as mentioned in Introduction to Computer Science Security , math is the core of security, and as I promised I will try to make this part as simple as possible. Before we start our discussion, I'd like to mention that during this tutorial, you ...

Privileged Password Security: How to Protect your Organization
By: Olivia
February 8, 2017

You turn on the evening news and a breaking report flashes, “Major Data Breach of Huge Corporation, details at 11” and you immediately begin to question, “could this happen to my organization?” In the wrong hands, privileged accounts represent the biggest threat to enterprises and unfortunately are a reality for many companies who are not exercising the right precautions.According to ...

What is the Role of a White Hat Hacker?
By: Alfie
February 8, 2017

Breaches. Breaches. In the past two years, we have read, witnessed or even been affected by attacks even on some fortune 500 companies. The attacks have become sophisticated, notorious and devastating. This calls for advanced blue team efforts which should be focused and relentless. For all we know, the attacker is always ahead.Most companies I have interactions with have ...

Why I Started a Cyber Security Internship Program
By: pweithers
February 8, 2017

One of my challenges during my tenure in college was the discovery of new and creative ways to make learning and retention easier for myself. I made note of the positive effects of activities which created reinforcement, and a sense of confidence over the subject matter. Eventually, I observed that hands-on interaction during events such ...