0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Juliar programming language allows full customization, which means you can control which commands you can use and which are banned. Two commands that are essential to know: allowcommands and denycommands With allowcommands you can list which commands are allowed to be used.With denycommands you can ban commands which you don't wish to permit.If you want ...


Hey guys,For this tutorial, you will need latest version of Juliar which can be downloaded at https://www.juliar.org/downloads.ju Although using the import command is great, it lacks one feature: the ability to load a website.Now an old feature has been added back, you can now use fetch to fetch a URL. It's Easy So let's fetch google. In ...


This is a simple method to produce a completely secure password without having to memorize it: Open Excel. Copy this formula into cell A1 - T20: "=IF(ROUND(RAND(),0)=0,CHAR(RANDBETWEEN(65, 90)),CHAR(RANDBETWEEN(97, 122)))" (Without the quotes) This puts either a lower case or upper case letter in the cell, allowing for 26 2 = 52 different possible ...


This is a list of Linux security distributions designed for hackers, pentesters, malware analyzers, reverse engineers, and other cyber security professionals. Kali Linux Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It is one of the most popular Linux security distributions. It's easy to update and ...


Hey, guys!Do you know that there are sites that allow you to take over a computer by remote control and even access the camera?You know this is disturbing behavior! Someone is looking at everything you do on your computer and on top of that he's watching you through the webcam while you're watching the screen.With the new Juliar ...


Arduino is an open-source project that created micro-controller based kits for building digital devices and interactive objects that can sense and control physical devices.Arduino boards are available commercially in preassembled form, or as do-it-yourself kits. Some of them are really small and have a built-in USB connector which makes sketch upload easier.Some of you may be thinking, how can ...


I think rsync is a great tool for copying data and I would like to share some of the commands I use most frequently.Some of the information presented in this guide was copied directly from the rsync man pages. Copying Data on a Local Machine: rsync -avHP /source/path/ /destination/path/ Flags ...


Artificial Intelligence and Automating Incident Response Updated August 2018 Managing the sheer number of alerts that get raised by incident response systems on a monthly basis has reached the point of overwhelm in many organizations. For the most part, it’s reached the point where InfoSec professionals have been forced to dial back the ...

My previous article on biometric verification raised an interesting concern with my readers: can 3D printing be used to copy fingerprints, creating an exploitable vulnerability?Here is the answer to that question:Fingerprints aren't the only means of biometric verification.There are several factors that can be used biometrically: Fingerprints Iris/Retina Scan Face ...


As a developer who uses Windows, OSX, and Linux, this is why I think so. Why Do I Develop Using Linux? When I am working on LAMP servers, I like to have as much of a local testing environment as I can. I can have all the same software and even different versions of the software running ...