0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Your computer environment is safe; but is your vehicle still in the driveway? You may need to check. Having worked in the automotive security industry, and witnessing the rise of talks emerging at DefCon now covering vehicle data adaptation, now is the time to get forewarned about vehicle security. You know what they say, to be forewarned is to ...


Recently, I was reading a blog post about all the hot Christmas gifts for 2016 and their inherent vulnerabilities. Of course, there were the usual suspects like computers and mobile devices, but more IoT devices crept onto the list, including smart holiday lights that can be turned on and off via an app. Also included in the list, fitness trackers. ...


Hey Guys,I have gotten responses that you guys wanted a tool that is as advanced as Juliar but had the GUI and ease of use of RatTeam Toolkit. So for every security expert, I've decided to combine both tools into one.Introducing Juliar Security Toolkit: It's a simple tool that features everything from RatTeam Toolkit as well as other Juliar stuff.Today, ...


[caption id="attachment_157197" align="alignright" width="329"] Part of Cybrary's personal office library.[/caption] Updated August 2018 As we enter a brand new year filled with both hope and more than a fair degree of trepidation, As always, there are points in time where it's worth taking a moment to review how to be wise consumers of online ...


Juliar a now refined tool is a must-have companion for Hackers, Security Specialist, and IT. With an ever growing private modules, and ability to load almost any module written in any language using Juliar Universal Module Loader makes the language unique and easily customizable.Write a security program once in Juliar, and it will run on every device! That’s ...


A company hires you to cut costs on their infrastructure. This requires you to know what devices are part of their infrastructure. From there, you determine where the new fiber optic cable should be installed to maximize the benefit to the organization. Finally, you discover that a router is underutilized, and recommend reconfiguring some of the users ...


Today I'm going to describe the tool's and methods to use any Xfinity wifi for free. * Please note that this is intended for educational purposes. *Programs Required:TMAC https://technitium.com/tmac/ First, go to the website above and download the proper one for your os and arch type.Once it is downloaded, open the program. A list of networks will ...


What is scapy? Scapy is a python interpreter specialized in networking, it is a powerful interactive packet manipulation module. Scapy is able to replace many existant tools like: ettercap, nmap, ping, traceroute… Building only one packet with C programming language will take 60 lines of code; however, with ...


Sharing Files/Folders with Samba on Linux First you should install the samba module with using command line; #apt-get install samba Then, create a folder,has everyone (read-write) authorisation, on desktop #cd Desktop #mkdir -p “foldername” #chmod 777 “foldername” Then, open samba config folder and add these commands; #vi /etc/samba/smb.conf ...


Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I'll introduce two basic tips on this topic using Tor and Proxychains , so come on!First, install Tor and Proxychains on your Linux distribution: Debian and derivatives: $ sudo apt-get install tor proxychains Arch Linux ...