0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Everything in Linux is a file. Access to the files is controlled by assigning permissions on the basis of file owner, a group of users, or all users. Three types of permissions can be assigned to a file - read (r), write (w) and execute (x).To view the permissions for all files in a directory, type the following in terminal: ...


Exploding lithium ion (Li-ion) batteries in hoverboards made in China last holiday season and more recently, exploding batteries in Samsung’s Galaxy Note 7 phones has raised awareness – and paranoia – over this battery technology. It’s a technology that’s been commercially available for 25 years, so why the rash of explosions all of a sudden? That’s what ...


I'd like to share this python script email bomber with you! import smtplib#for SMTP Protocolimport mimetypes#converts URLimport sys#for Systemimport time#timefrom email.MIMEText import MIMETextclass SMTP(object):def title(self):print " PYTHON MAIL BOMBER IS WORKING :) " Then: def SMTPconnect(self):print "We are in the SMTPconnect"#list of SMTP server - https://www.e-eeasy.com/SMTPServerList.aspxself.smtpserver=raw_input("nEnter SMTP server: ")self.smtpport=input("Enter SMTP port (Usualy 25 or 465): ")try:self.mailServer = smtplib.SMTP(self.smtpserver,self.smtpport)except IOError, ...


Juliar programming language allows full customization, which means you can control which commands you can use and which are banned. Two commands that are essential to know: allowcommands and denycommands With allowcommands you can list which commands are allowed to be used.With denycommands you can ban commands which you don't wish to permit.If you want ...


Hey guys,For this tutorial, you will need latest version of Juliar which can be downloaded at https://www.juliar.org/downloads.ju Although using the import command is great, it lacks one feature: the ability to load a website.Now an old feature has been added back, you can now use fetch to fetch a URL. It's Easy So let's fetch google. In ...


This is a simple method to produce a completely secure password without having to memorize it: Open Excel. Copy this formula into cell A1 - T20: "=IF(ROUND(RAND(),0)=0,CHAR(RANDBETWEEN(65, 90)),CHAR(RANDBETWEEN(97, 122)))" (Without the quotes) This puts either a lower case or upper case letter in the cell, allowing for 26 2 = 52 different possible ...


This is a list of Linux security distributions designed for hackers, pentesters, malware analyzers, reverse engineers, and other cyber security professionals. Kali Linux Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It is one of the most popular Linux security distributions. It's easy to update and ...


Hey, guys!Do you know that there are sites that allow you to take over a computer by remote control and even access the camera?You know this is disturbing behavior! Someone is looking at everything you do on your computer and on top of that he's watching you through the webcam while you're watching the screen.With the new Juliar ...


Arduino is an open-source project that created micro-controller based kits for building digital devices and interactive objects that can sense and control physical devices.Arduino boards are available commercially in preassembled form, or as do-it-yourself kits. Some of them are really small and have a built-in USB connector which makes sketch upload easier.Some of you may be thinking, how can ...


I think rsync is a great tool for copying data and I would like to share some of the commands I use most frequently.Some of the information presented in this guide was copied directly from the rsync man pages. Copying Data on a Local Machine: rsync -avHP /source/path/ /destination/path/ Flags ...