0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

A Primer on Linux File Permissions
By: Divya Lakshmanan
November 10, 2016

Everything in Linux is a file. Access to the files is controlled by assigning permissions on the basis of file owner, a group of users, or all users. Three types of permissions can be assigned to a file - read (r), write (w) and execute (x).To view the permissions for all files in a directory, type the following in terminal: ...

When Lithium Ion Batteries Explode
By: rcubed
November 10, 2016

Exploding lithium ion (Li-ion) batteries in hoverboards made in China last holiday season and more recently, exploding batteries in Samsung’s Galaxy Note 7 phones has raised awareness – and paranoia – over this battery technology. It’s a technology that’s been commercially available for 25 years, so why the rash of explosions all of a sudden? That’s what ...

Email Bomber Script Using Python
By: Priyank Gada
November 9, 2016

I'd like to share this python script email bomber with you!  import smtplib#for SMTP Protocolimport mimetypes#converts URLimport sys#for Systemimport time#timefrom email.MIMEText import MIMETextclass SMTP(object):def title(self):print " PYTHON MAIL BOMBER IS WORKING :) " Then: def SMTPconnect(self):print "We are in the SMTPconnect"#list of SMTP server - https://www.e-eeasy.com/SMTPServerList.aspxself.smtpserver=raw_input("nEnter SMTP server: ")self.smtpport=input("Enter SMTP port (Usualy 25 or 465): ")try:self.mailServer = smtplib.SMTP(self.smtpserver,self.smtpport)except IOError, ...

Advanced Techniques in Juliar: Allow and Deny Commands
By: Rattar
November 9, 2016

Juliar programming language allows full customization, which means you can control which commands you can use and which are banned. Two commands that are essential to know: allowcommands and denycommands With allowcommands you can list which commands are allowed to be used.With denycommands you can ban commands which you don't wish to permit.If you want ...

Fetching a Website Using Juliar
By: Rattar
November 9, 2016

Hey guys,For this tutorial, you will need latest version of Juliar which can be downloaded at  https://www.juliar.org/downloads.ju Although using the import command is great, it lacks one feature: the ability to load a website.Now an old feature has been added back, you can now use fetch to fetch a URL. It's Easy So let's fetch google. In ...

Creating Secure Passwords with Two Pieces of Paper
By: ProgrammerE
November 9, 2016

This is a simple method to produce a completely secure password without having to memorize it: Open Excel. Copy this formula into cell A1 - T20: "=IF(ROUND(RAND(),0)=0,CHAR(RANDBETWEEN(65, 90)),CHAR(RANDBETWEEN(97, 122)))" (Without the quotes) This puts either a lower case or upper case letter in the cell, allowing for 26 2 = 52 different possible ...

10 Linux Distributions for Cyber Security Professionals
By: toxicptr
November 8, 2016

This is a list of Linux security distributions designed for hackers, pentesters, malware analyzers, reverse engineers, and other cyber security professionals. Kali Linux Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It is one of the most popular Linux security distributions. It's easy to update and ...

Using *Juliar* to Fool Webcam Hackers
By: Rattar
November 8, 2016

Hey, guys!Do you know that there are sites that allow you to take over a computer by remote control and even access the camera?You know this is disturbing behavior! Someone is looking at everything you do on your computer and on top of that he's watching you through the webcam while you're watching the screen.With the new Juliar ...

Hacking with Arduino: Build Your Own USB Payload
By: markpepapa
November 8, 2016

Arduino is an open-source project that created micro-controller based kits for building digital devices and interactive objects that can sense and control physical devices.Arduino boards are available commercially in preassembled form, or as do-it-yourself kits. Some of them are really small and have a built-in USB connector which makes sketch upload easier.Some of you may be thinking, how can ...

How to Copy Data with Rsync Via SSH
By: faildriller
November 8, 2016

I think rsync is a great tool for copying data and I would like to share some of the commands I use most frequently.Some of the information presented in this guide was copied directly from the rsync man pages.   Copying Data on a Local Machine: rsync -avHP /source/path/ /destination/path/  Flags ...