0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Analyzing AndroidManifest.xml File with Yara and Python
By: anomali8888
August 2, 2017

Important note: Before you try this tutorial, please make sure that Python version 3 and the Yara library are installed on your operating system.Yara is a multi-platform tool that is used for pattern matching in malware analysis to identify and classify malware samples. With Yara you can create description and rules to be applied with. from this point ...

Broken Authentication and Session Management – Part 1
By: Hari Charan
August 2, 2017

According to OWASP, Broken Authentication and Session Management is when  ‘Application functions related to authentication and session management are not implemented correctly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities.’  In other words, an attacker can get unauthorized access of the user due to the flaw ...

Cybersecurity as a Service (CSaaS)
By: jeffcyber-2016
August 1, 2017

Cybersecurity as a Service: The CSaaS Model to Rule the FutureWith the evolution and the industry acceptance of the Software Defined Network (SDN), the line between the physical and the virtual are becoming increasingly blurred. The need to own physical devices and maintain a private network is rapidly being replaced by the cloud and the concept of (X)aaS where ...

Tutorial: Socket Testing Tool Source Code
By: Bmsr256
July 31, 2017

This time I will show you here a source code of a socket testing tool written in Python. This is a good, simple tool to test the Internet sockets using the IP of the target host and the port.Here's the source code: **`## Socket Testing Tool import sys import socket import getopt import threading import subprocesslisten = False command = False ...

Free DBX to PST Converter to Import DBX Files
By: mahima11
July 31, 2017

DBX to PST Converter software helps you import from Outlook Express to Outlook. It’s one the easiest and best ways for DBX to PST conversion in a single click. We’ve smartly designed DBX to PST Converter software to enhance users’ ex perience with its smart conversion algorithm. It can convert single as well as multiple DBX files ...

Systems Administrator Appreciation Day
By: Olivia
July 28, 2017

Recently, I’ve been trying to provide some ‘job specific’ guidance to help Cybrarians forge a path of study that will help them move forward in their careers more easily. I’ve put a lot of focus on ‘security’ careers, but considering July 28 th is Systems Administrator Appreciation Day, I figured it was a good opportunity to ...

UNM4SK3D: Black Hat, IoT, and 32M
By: Olivia
July 28, 2017

#diversity This year marks the 20th anniversary of the annual Black Hat conference in Las Vegas and quite appropriately in our digital age, the keynote was given by Facebook's CSO, Alex Stamos. Stamos' briefing covered defensive security research and took a somewhat unexpected turn to discuss empathy and diversity.  Placing responsibility on the security ...

Cyber Security Chronicles: Age of Blind Accessibility with No Vision
By: THE CYBER EAGLE (CYBER SECURITY + NETWORK SPECIALIST)
July 28, 2017

{Chronicle 3} By The CYBER EAGLE (Jeremy Bannister)  The Information Technology industry is in a major transition state as we move towards the end of the second decade of the millennium in the United States of America. Well, some might say that this industry is always in a transition state or in a constant state ...

Which MCSE Certification Is Best and In Demand?
By: michaelwarne
July 27, 2017

Microsoft Certified Systems Engineer is a top level IT credential validated by Microsoft. The MCSA (Microsoft Certified Solutions Associate) is the first requirement of eligibility for the (MCSE) . The MCSE ...

Understanding Unpredictable Threats: Advanced Malware
By: strainer
July 26, 2017

  Unpredictable Threats – Advanced Malware By: Art Rebultan How do you think a traditional, signature-based anti-malware can detect unpredictable threats like Polymorphic, Metamorphic and Cross-Platform malware? This advanced malware has the same destructive functionalities from any of the commonly known malware; Trojan, Worm, Virus, Keylogger, Ransomware, Bot, Adware, Rootkit, and Spyware. Polymorphic While ...