0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cryptography: Hiding Any File in Any Other File Without Losing Data
By: Babak Esmaeili
August 22, 2016

There are many ways of hiding data in cyber security, but one of the simplest and safest way is to use our: Hex editor, Notepad++ and a unique palmy key.  Tools Needed: HXD hex editor Notepad++ A unique key --> for instance, mine is : 3434k (it's totally desirable ...

Understanding How Botnets Work
By: Antr4ck
August 21, 2016

Introduction Botnets are computer botnets, which are programs connected to the Internet to communicate with other similar programs to perform certain tasks. An Internet bot is an automated or semiautomatic software agent that interacts with computer servers. A bot connects and interacts with the server as a client program used by ...

Windows Command Line Shutdown
By: Gov't Mule
August 19, 2016

This is particularly useful when you're connected to a Windows system via RDP or a VPN tunnel and need to shutdown or reboot the system. Using the "Start" button when using RDP, the only options offered are "Logoff", then Disconnect or Lock. Not very useful when you need to reboot or just shut the system down from a remote ...

Python Guide: From Zero to Hero
By: chiheb chebbi
August 19, 2016

This is a detailed tutorial designed for coders who need to learn the Python programming language from scratch. In this course, I'll try to highlight many of Python's capabilities and features. Python is an easy-to-learn programming language.  Your First Program >>> print "Hello World"Hello World>>>   On UNIX: #!/usr/local/bin/pythonprint "Hello World"   Expressions Expressions are ...

Getting Started in Ethical Hacking
By: tavesey
August 19, 2016

Hacking has been around for a very long time. Hacking is something that many people want to learn, but fail to do so. There can be several reasons for that. There are quite a few misconceptions about this subject that I'd like to talk about and share with everybody. I'll also help you get into hacking the right way, so ...

Do I want to be a Hacker? Sort of...
By: infosectdk
August 18, 2016

“How do I become a hacker?” This is a recurring theme/question that's cropping up more and more. I will be frank and honest: I get a bit bored seeing this. And, if that's your first and initial focus as a path into InfoSec, then it's a bit narrow.I will say hats off to KnightsCode for their ...

The First PC Virus: Brain Virus
By: usman47
August 18, 2016

Hello my Geeky Hackers,Today, I'm going to tell you about the first PC virus ever written that comes from my own country, Pakistan. Hopefully you guys will love the story (..) .  Who , When, Why  and How? Brain Virus is considered to be the first virus written for PC's. It was written in 1986 by two brothers: Basit ...

29 Useful Commands in Nmap (Plus a Bonus)
By: cardangi
August 17, 2016

#1: Scan a single host or an IP address (IPv4) ### Scan a single ip address### nmap 192.168.1.1 ## Scan a host name### nmap server1.cyberciti.biz ## Scan a host name with more info### nmap -v server1.cyberciti.biz Sample ...

How to Write a Script in Kali Linux Used to Identify Hashes
By: junkwerks
August 17, 2016

[caption id="attachment_70042" align="aligncenter" width="1024"] Linux Password File [/caption]I was planning to move on from my series on hashing, but after spending some time digging around /usr/bin on my Kali VM, I decided that a little more fun could be had. So, let's say you are on a pentest job and come across some hashes. These will ...

A Beginner's Guide to Entropy
By: maggiee
August 16, 2016

Recently on Cybrary OP3N, I read this article  on Distributed Random Bit Generators. While the article was informative, I thought that readers unfamiliar with the concept of entropy might not be able to grasp some of its contents. I was thus inspired to write the this complete beginner’s guide to Shannon entropy, including a use case ...