0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Tax Hacks: How to Protect Your Data During Tax Season
By: Olivia
February 6, 2018

As if tax season wasn’t enough to give you a headache, this year the risk of being scammed is higher than ever. “Why?” you groan. In the wake of the Equifax breach, in which millions of Americans personally identifiable information (PII) was compromised, much of the data needed to commit a scam during tax season is more ...

Convert Lotus Notes to Outlook with Effortless Solutions
By: alainajodi
February 6, 2018

Lotus Notes and Outlook are two vital email clients which provide a vast number of services such as emailing, attachments, maintaining contacts, etc. But sometimes MS outlook is preferred more than Lotus Notes due to several reasons like smooth processing and less technical knowledge. MS outlook has become a very popular client among ...

Don’ts and Do's to Prevent Database Corruption in SQL Server
By: justin hansen
February 6, 2018

Database corruption is the most common problem encountered by the DBAs in their day to day life. Often users trying to repair a corrupt SQL Server database using DBCC repair option (REPAIRALLOWDATA_LOSS), which can cause some unexpected data loss or make it completely inaccessible. So, it is always advised to be aware of whatever you are going ...

Understanding Security and Compliance
By: reciprocity
February 5, 2018

Security and compliance are not competing but complementing interests. The two work together to safeguard both your business and customers. Compliance helps vendors to prove themselves to customers as well as avoid punitive fees from regulators. On the other hand, security helps to instill trust and prevents potentially massive financial and data losses ...

Network Security Scanning with Nmap
By: Shaquib Izhar
February 5, 2018

 Today we are going to scan a network for common publicly known Cybersecurity vulnerabilities with Nmap. As we all know Nmap is a very powerful tool when it comes to network scanning to find vulnerabilities in a network. It contains lot of scripts prebuilt for lot of task like for brute forcing a network login ...

What You Need to Establish a Thriving Branding Campaign for Your Business
By: Isabella Roz
February 4, 2018

It is no doubt apparent to every business owner that branding is essential. Branding gives your business fame and popularity, and it helps to grow and develop the business more. In the ever-growing competition in today's world, a product which is branded will undoubtedly have more edge and customer trust than a product ...

Sub-Domain Scanner Using Censys and Python
By: P3t3rp4rk3r
February 3, 2018

Hey guys, After a long time I wanna post something related hunting subdomains using Censys API and Python script . I used this technique long back while I’m doing pentesting stuff against targeted client. This script will find subdomains using Censys (Certificate Transparency logs). It will read all SSL certificates and correlate and give the particular ...

Find Dumped Password using Google Dork
By: Sahad Mk
February 3, 2018

In this post, I introduce some sensitive information- passwords usingGooglee dorks. This technique would help you in various phases of your penetration test.1. ext:sql intext:username intext:password This piece of query retrieve the clear text password of database files.ex: mysql> SELECT * FROM userss;+--------+-------------------+------------+| userid | username | password ...

How to Catch Phishing Sites with Certstream Logs
By: Shaquib Izhar
February 1, 2018

  What is certstream   CertStream is an intelligence feed that gives you real-time updates from the Certificate Transparency Log network, allowing you to use it as a building block to make tools that react to new certificates being issued in real time. And by using this we ...

Why SQL is Still The Staple Choice in Database Management Systems
By: thomassujain
January 31, 2018

Database Management Systems or DBMS have been in use for more than forty years, but only in recent times, the tested and tried systems are facing a significant challenge posed by Big Data. Lots of discussions are doing the rounds about the need to look at alternative models of data processing and management ...