0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”Heathen IoT of Things Penetration Testing Framework developed as a research project, which automatically help developers and manufacturers build more secure products in the Internet of Things space based on the Open ...


Cyber Dust (the current app name, which is soon to be just 'Dust') is truly 100% secure. Mobile messages are sent from your device to your associates device. Once it's read it disappears completely.According to one source: " Cyber Dust is simply a more natural way to communicate without leaving a trail of everything you say. Messages ...


PenBox – A Penetesting Framework The Penetration Testing Framework, PenBox, is in the last version. It will have every script that a hacker needs, including: Information Gathering Nmap Setoolkit Port Scanning Host To IP WordPress user enumeration ...


SSD (Solid State Drive) discs are used very commonly worldwide nowadays. Come with me to look at the advantages of these devices. Here's a quick summary of what you'll get with these SSD discs: Faster boot of OS's High stamina as you don't have any mechanical parts Low power consumption ...


There are many ways of hiding data in cyber security, but one of the simplest and safest way is to use our: Hex editor, Notepad++ and a unique palmy key. Tools Needed: HXD hex editor Notepad++ A unique key --> for instance, mine is : 3434k (it's totally desirable ...


Introduction Botnets are computer botnets, which are programs connected to the Internet to communicate with other similar programs to perform certain tasks. An Internet bot is an automated or semiautomatic software agent that interacts with computer servers. A bot connects and interacts with the server as a client program used by ...


This is particularly useful when you're connected to a Windows system via RDP or a VPN tunnel and need to shutdown or reboot the system. Using the "Start" button when using RDP, the only options offered are "Logoff", then Disconnect or Lock. Not very useful when you need to reboot or just shut the system down from a remote ...


This is a detailed tutorial designed for coders who need to learn the Python programming language from scratch. In this course, I'll try to highlight many of Python's capabilities and features. Python is an easy-to-learn programming language. Your First Program >>> print "Hello World"Hello World>>> On UNIX: #!/usr/local/bin/pythonprint "Hello World" Expressions Expressions are ...


Hacking has been around for a very long time. Hacking is something that many people want to learn, but fail to do so. There can be several reasons for that. There are quite a few misconceptions about this subject that I'd like to talk about and share with everybody. I'll also help you get into hacking the right way, so ...


“How do I become a hacker?” This is a recurring theme/question that's cropping up more and more. I will be frank and honest: I get a bit bored seeing this. And, if that's your first and initial focus as a path into InfoSec, then it's a bit narrow.I will say hats off to KnightsCode for their ...