0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


As anyone who's into the field of cyber security knows, there are many applications of these skills. Some people use them for their careers, others use it for self gain, and there are others, called hacktivists, that use the skills to do what they believe is benefiting society. There are many hacktivist movements, a large one being Anonymous, and ...


It's been made public by Google researchers that there's a severe bug in GlibC library (A GNU C Library). This is the most fundamental library used by almost every application and almost every Linux-based distribution.Many routers and other hardware devices that used this library could be exploited. Also, programming languages such as Python, PHP and Ruby are affected.The bug ...


First, a look at some code: Add-PSSnapin Microsoft.Exchange.Management.Powershell.E2010 $header = "<style type='text/css'>n" + "td { width: 200px }n" + "th { text-align: left }n" + "</style>"$d = get-date$nondefault = Get-Mailbox -Database 'Mailbox Db0' | Where-Object {$_.UseDatabaseQuotaDefaults -ne $true} | Select-Object Name, IssueWarningQuota, ProhibitSendQuota | ConvertTo-html -Title "Mailboxes in Mailbox DB2" -Head $header$emailFrom = ...


This my first post, so I'll start with a serious issue in our day-to-day lives. I'm posting for the purpose of awareness.Millions of people use online services every day. It's crucial that systems prevent users from accessing each other's information. So, they need ways of uniquely identifying each user that prevent users from impersonating each other. This is called ...


Hey Guys,As promised, I'll describe a way to translate IP's by hand. I'll continue to write more articles about this subject as long as people are interested. What will we learn? You'll learn how to translate IP's (original v4 format), which consists of 4 decimal octets to a 1 decimal octet. What materials do you need? -1 Pencil-1 Paper-Google Chrome ...


If you're tasked with pinging a huge list of workstations, look no further. Gone are the days where we must keyboard cram in the command prompt to test connectivity.First off, let's get you started with PowerShell. PowerShell is a free program offered by Microsoft and it's basically a command prompt on steroids.It's easy to find and easy to download. ...
![[podcast] Pentesting and Defending a Mainframe and Mainframe Security](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

[embed]https://traffic.libsyn.com/brakeingsecurity/2016-008-mainframe_secruity.mp3[/embed]This week's super-sized episode is brought to us thanks to previous guest Cheryl Biswas. You might remember her from our "Shadow IT" ( http:/brakeingsecurity.com/2015-048-the-rise-of-the-shadow-it ) podcast a few months ago. She reached out to us to see if we were interested in doing a podcast on mainframe security with her and a couple of gentlemen that were not unknown to us.Of course ...


Welcome to Kali Linux Command Lines – Part 4. This part will explain the use of Man pages ( also called Manual Pages ) on your Unix or Linux computer. I'll talk about related commands like ' whereis ' & ' whatis '. Man pages can be used to know the use of tools or how to use tools. ...


Where's the honesty? New FCC rules may prevent installing alternative software e.g. OpenWrt/Gargoyle, Tomato on some routers. In Europe, it does not apply. However, companies such as tp-link goes to the sitter and all the utensils for the global market will have this limitation.Many stock firmwares e.g. tp-link and others are insecure and do not allow the ...


Secure Your WiFi in 7 Steps If the first question that comes to mind after reading the topic of this post is ‘Why do I need to secure my WiFi?’, then read on... What are the risks of using an unsecured wireless network? In simple language, it's like going for a trip without locking ...