0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Building a Linux Monitoring Infrastructure II
By: Abayomi Ayoola
January 27, 2017

Estimated reading time: 2.5 minutes [Continued from Building a Monitoring Infrastructure I ] Install binaries, init script, sample config files and set permissions on the external command directory. root@Nagios:~/Downloads/nagios-3.0.5#make installroot@Nagios:~/Downloads/nagios-3.0.5#make install-initroot@Nagios:~/Downloads/nagios-3.0.5#make install-configroot@Nagios:~/Downloads/nagios-3.0.5#make install-commandmode 4. Customize Configuration Edit the  /usr/local/nagios/etc/objects/contacts.cfg  config file with your favorite editor and ...

The Many Faces of Social Media: The Good, Profitable and Ugly
By: rcubed
January 26, 2017

This next to last post in the series begun a few weeks ago on “ How to be an Educated Consumer of Online Information ” covers the vast topic of social media. It’s so vast in fact, that apart from a general overview of this particular communications channel, I’ll only be able to discuss Facebook and Twitter ...

Juliar.Future: Guide to building a simple program
By: Rattar
January 26, 2017

Estimated reading time: 1 minute Hey guys,Today we will be learning to program something in Juliar.Future (j.F)j.F allows the use of prefix notation, that means      + 3 2 is equivalent to 3+2. This is useful in Juliar as it allows you to call + on every element. It makes sense to use it on a ...

Who, Not What, is the ‘R’ in RSA?
By: Olivia
January 25, 2017

The other day, I took to Cybrary’s search feature in hopes of finding information on an inventor of the RSA public-key cryptosystem , and when nothing turned up, not only was I utterly disappointed, but it made me wonder why we do not dedicate more of our interest to influential individuals within the field of cyber security. It also ...

NTP Vulnerabilities: What happens when your friend turns on you?
By: deleriumendless
January 25, 2017

Estimated reading time: 2 minutes Ah, the heartbreak! That ever-reliable best friend quietly running on port 123 and keeping us all in sync. We know it, use and love it... Network Time Protocol.Back in December 2016, ICS-CERT released an advisory describing a set of remotely exploitable NTP vulnerabilities. This is an issue on the level of ...

Reverse TCP Shell Client and Server
By: Priyank Gada
January 24, 2017

About Video: In this article, we will create a reverse TCP shell and take a look at how to create a reverse TCP client as well as a server using python.The client-side shell will be sent to the target machine. It will fetch commands that are trying to be sent to the Kali machine. Learn using Virtualbox and a victim Windows ...

Health Care Security - Compartilhamento de dados de pacientes
By: R
January 24, 2017

Estimated reading time: 3 minutes Health Care Security - Sharing Patient Data Translation provided by Google Translate. Original Portuguese Submission is available below the translation. I have observed over the past three years along with several organizations that directly or indirectly deal with patient data, dizzying growth, not to say rushed or ...

Download an Image Using Python
By: rk
January 23, 2017

Estimated reading time: 1 minute Hello, everyone.Today I will show you how to use Python to download any image from the web.First, let's take a look at a script that I will explain what each statement is doing. import urllib.request import random def downloader (imageurl): filename = random.randrange( 1 ...

SecurityOnion 1st Time Configuration and Set-Up
By: Meta
January 23, 2017

Estimated reading time: 2.5 minutes Loading and setting up SecurityOnion This tutorial is intended mostly for beginners or anyone who wants to set up their first network monitoring device with some pre-configured tools to test out but anyone is free to use it.Security Onion is a Linux distro for intrusion detection, network security ...

Kepler Architecture
By: bachan
January 22, 2017

What's up Cybrarians?Hope you're all doing well since my last post! Today, I want to tell you about the architecture of the GPGPU that most of us may be using in our graphics cards.As we all know, NVIDIA is the giant in the field of graphics cards and high-performance computing. The most common architectures used by NVIDIA are Fermi, Kepler, Maxwell ...