0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


This is a completion of the first article Python Guide Part 1: https://www.cybrary.it/0p3n/python-guide-part/ This article is about very basic and common input/output commands in python programming, as well as statements, itterator, import, and functions. 1/ Let's start with input: We use input (input or raw_input) functions to read from the ...


This article explains which are the Linux commands most used by attackers and how to defend against these attacks . Although the solutions are based on Linux they work on other Unix-like systems as well. The commands were obtained from a study by D. Ramsbrock, R. Berthier and M. Cukie from the ...


Have you came across any Facebook Message with an image file of .SVG file format ? If not then you are lucky and if you received it then avoid clicking it.If clicked, the file would eventually infect your PC with the nasty Locky Ransomware, a family of malware. In a short ...


Hi Readers, While conducting an assessment in WhatsApp web application, I noticed the .gitignore file was being exposed. What are .gitignore files? This is a user defined file which tells the “git” not to track certain files. For example: If you add a ...


Being that it’s Black Friday, I thought it only fitting to revisit the infamous Target Security Breach of holiday shopping seasons past. For Cybrarians, there’s a lot to take from the case, particularly in the area of pentesting and fundamental network security best practices. And finally, there are the painful lessons of the high cost ...


Now-a-days most of the people are crazy and desire to become a hacker, hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the time. In simple, hacking is a technical skill of a person. So it is good to have some extra skills ...


One day after installing an XYZ application from an unknown developer my phone started reacting weirdly and by weirdly I mean some text was displaying on the screen stating “Pay 3 Bitcoin and get access to your phone”. I have no idea as what to do! To access my own phone I have to pay ...


Even though the average person might not be aware of it, software is everywhere in our daily lives. Everything from online transactions, buying a smartphone, to driving a car involves software. As consumers, we assume and take for granted that the software used to take care of things in our daily lives will not only work as we need ...


Introduction With increased usage of Wi-Fi, you can always except internet security and privacy issue to grow with time. Once cannot stay away from the usage of wireless networks but with a few precaution and implementing security best practices one can possibly keep data safe . ...


Dust off your comic books, Superman is back.Imagine this: In the latest issue, Superman sets up a secure perimeter around Metropolis. Or at least, he thinks it’s secure. While he’s leading his other life as Clark Kent, Lex Luther takes advantage of his accidental neglect to breach the boundaries Superman has set up, destroying the lives of millions in Metropolis ...