0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Top Tips for being an Educated Consumer of Online Information
By: Tatianna
January 3, 2017

[caption id="attachment_157197" align="alignright" width="329"] Part of Cybrary's personal office library.[/caption] Updated August 2018 As we enter a brand new year filled with both hope and more than a fair degree of trepidation,   As always, there are points in time where it's worth taking a moment to review how to be wise consumers of online ...

Juliar - A Tool for 2017
By: Rattar
January 3, 2017

Juliar  a now refined tool is a must-have companion for Hackers, Security Specialist, and IT. With an ever growing private modules, and ability to load almost any module written in any language using Juliar Universal Module Loader makes the language unique and easily customizable.Write a security program once in Juliar, and it will run on every device! That’s ...

Introduction to Graph Theory
By: ProgrammerE
January 2, 2017

A company hires you to cut costs on their infrastructure. This requires you to know what devices are part of their infrastructure. From there, you determine where the new fiber optic cable should be installed to maximize the benefit to the organization. Finally, you discover that a router is underutilized, and recommend reconfiguring some of the users ...

How to Get Unlimited Free Xfinity WiFi Trials
By: bigcode1991
January 2, 2017

Today I'm going to describe the tool's and methods to use any Xfinity wifi for free.  * Please note that this is intended for educational purposes. *Programs Required:TMAC    https://technitium.com/tmac/ First, go to the website above and download the proper one for your os and arch type.Once it is downloaded, open the program. A list of networks will ...

Scapy Project
By: ziednamouchi
January 1, 2017

  What is scapy? Scapy is a python interpreter specialized in networking, it is a powerful interactive packet manipulation module. Scapy is able to replace many existant tools like: ettercap, nmap, ping, traceroute… Building only one packet with C programming language will take 60 lines of code; however, with ...

Sharing File/Folder with Samba on Linux
By: mfk1907
December 31, 2016

Sharing Files/Folders with Samba on Linux First you should install the samba module with using command line; #apt-get install samba Then, create a folder,has everyone (read-write) authorisation, on desktop #cd Desktop #mkdir -p “foldername” #chmod 777 “foldername” Then, open samba config folder and add these commands; #vi /etc/samba/smb.conf ...

Tor and Proxychains - Tip for Hacking Anonymous
By: ryanshady
December 30, 2016

Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I'll introduce two basic tips on this topic using Tor and Proxychains , so come on!First, install Tor and Proxychains on your Linux distribution: Debian and derivatives: $ sudo apt-get install tor proxychains Arch Linux ...

MITM - Hacking With WiFi-Pumpkin
By: Jeret Christopher
December 30, 2016

MITM - Hacking With WiFi-Pumpkin Hi, welcome to " man in the middle " hacking with Wifi-Pumpkin tutorial:This tutorial will show you how to get user credentials (social media credentials) using a tool called Wifi-Pumpkin on ParrotSec with a custom fake login page. Following hacks has been tested with ParrotSec (Linux operating ...

UNM4SK3D: PHPMailer, OpenStack, and Amazon
By: Olivia
December 30, 2016

#criticalvulnerabilities If there was a book of critical vulnerabilities across the Internet, it'd be longer than the Bible. The latest discovered in PHPMailer by Polish researcher David Golunski, is one that affects multiple popular, open-source web applications. Probably one of the biggest vulnerabilities to be recognized in recent news, PHPMailer, an open-source PHP ...

Ransomware: When it's truly better to be safe than sorry
By: rcubed
December 29, 2016

In general, encryption is a good thing and the stronger the better. Protecting data both at rest and while in transit is a recommended security best practice of which you should be aware. But when you discover that all the files on your computer have been encrypted with 2048-bit AES encryption and you had nothing to do ...