0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


As a developer who uses Windows, OSX, and Linux, this is why I think so. Why Do I Develop Using Linux? When I am working on LAMP servers, I like to have as much of a local testing environment as I can. I can have all the same software and even different versions of the software running ...


In the last article titled " Networker’s View of Windows CMD ," we learned about useful CMD commands which can help us troubleshoot/manage networking configuration of our computer. In this article, we'll see how to use Python script to automate the execution of these commands. As some of you may already know Python is extremely powerful ...


To be a hacker you should know many programming languages and skills since the various applications and websites which you'll exploit are programmed in different programming languages.A hacker is a person who finds the vulnerabilities in a computer program or a computer network and then exploits them by using one of these programming languages to write an exploit that addresses a ...


Hello guys,Most of us have many dictionaries for cracking hashes or passphrases, such as "rockyou" and "cain."When we don't find a password in one dictionary we try another dictionary manually.I want to escape that extra work.I am going to tell you about an awesome tool: DyMerge. This is a tool written in python for merging two or more dictionaries into ...


Today I want to share with you a true story that happened to me last week. Although a bit off-topic, you might find it amusing, useful, and a real time saver in case you ever need to do the same thing.When I bought my desktop PC last year, I purchased an SSD drive to use as the system drive ...

As a cyber security expert doing a lot of research I've found a solution for identity theft.A security step added for identity verification which is known, but not added as a process in either the industries or governments of many countriesWe all know that by using foot- printing and reconnaissance methods, a hacker can access SSNs, personal information, addresses, ...


All of us remember the tale of Alibaba and Forty thieves, where Alibaba protects the treasure with a secret passphrase to enter the cave “Khulja, Simsim”. But unlike Alibaba who just don’t have to remember more than one password, today password became an integral part of our lives. From social ...


Networker's View of Windows CMD: Hello fellow members of this wonderful community. Today we shall once again dive into the MS Windows CMD to explore some of its commands which can help us troubleshoot/manage networking configuration of our computer. First and arguably the most important command on our list is ipconfig (Internet Protocol ...


I thought it might be both interesting and challenging to examine the recent revelation about the newly discovered emails on Anthony Weiner’s laptop. Emails that the FBI feels may be pertinent to the Hillary Clinton Email case. It should be an Interesting topic for Cybrarians taking any of the courses here on Cybrary.it dealing with computer ...


Microsoft Windows 7 operating system, as well as previous versions of Windows OS, comes with a built-in shutdown command which among other things enables the user to initiate a shutdown procedure. By entering the shutdown /? command inside CMD (Command Prompt) you can see the ...