0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What You Need to Establish a Thriving Branding Campaign for Your Business
By: Isabella Roz
February 4, 2018

It is no doubt apparent to every business owner that branding is essential. Branding gives your business fame and popularity, and it helps to grow and develop the business more. In the ever-growing competition in today's world, a product which is branded will undoubtedly have more edge and customer trust than a product ...

Sub-Domain Scanner Using Censys and Python
By: P3t3rp4rk3r
February 3, 2018

Hey guys, After a long time I wanna post something related hunting subdomains using Censys API and Python script . I used this technique long back while I’m doing pentesting stuff against targeted client. This script will find subdomains using Censys (Certificate Transparency logs). It will read all SSL certificates and correlate and give the particular ...

Find Dumped Password using Google Dork
By: Sahad Mk
February 3, 2018

In this post, I introduce some sensitive information- passwords usingGooglee dorks. This technique would help you in various phases of your penetration test.1. ext:sql intext:username intext:password This piece of query retrieve the clear text password of database files.ex: mysql> SELECT * FROM userss;+--------+-------------------+------------+| userid | username | password ...

How to Catch Phishing Sites with Certstream Logs
By: Shaquib Izhar
February 1, 2018

  What is certstream   CertStream is an intelligence feed that gives you real-time updates from the Certificate Transparency Log network, allowing you to use it as a building block to make tools that react to new certificates being issued in real time. And by using this we ...

Why SQL is Still The Staple Choice in Database Management Systems
By: thomassujain
January 31, 2018

Database Management Systems or DBMS have been in use for more than forty years, but only in recent times, the tested and tried systems are facing a significant challenge posed by Big Data. Lots of discussions are doing the rounds about the need to look at alternative models of data processing and management ...

The Best Courses and E-books To Learn Cryptography for Beginners.
By: Amine Amhoume
January 30, 2018

What is Cryptography ?   Cryptography is the artistry of using codes, mathematics, and ciphers to preserve the privacy of a two-sided communication, a file, or a message, so no third-party person or organization can recognize it, this is a conventional definition of Cryptography that was being used through thousands of years before. ...

What Can Football Teach Us About Cyber Security?
By: Olivia
January 30, 2018

“In football if you don’t practice you don’t win and in cybersecurity if you don’t practice you don’t win.” -Critt Golden With the SuperBowl less than a week away, I’ve found myself spending a lot more time thinking about football. It’s hard not to admire the skills of professional athletes, who compete at such a ...

Top 5 Hacking Techniques You Should Know About
By: shantanurauthan
January 29, 2018

Bait and Switch Using bait and switch hacking technique, an attacker can buy advertising spaces on the websites. Later, when a user clicks on the ad, he might get directed to a page that’s infected with malware. This way, they can further install malware or adware on your computer. The  ads ...

MBOX to PST Converter to Retrieve MBOX Data in Outlook
By: stevesmith27
January 29, 2018

Nowadays, it is a basic problem for users where they are seeking to convert MBOX to PST format to import MBOX files in Outlook . It helps you to retrieve MBOX data in any Outlook edition without any extra efforts. If you are also looking to export MBOX to ...

Handling NMSG Payload with Python
By: anomali8888
January 28, 2018

In this article, I'm going to show you how to handle NMSG payload using python . so before dive in into the programming, we may want to step back to to introduce you what is NMSG.NMSG is one of the tools that implement passive dns analysis, with nmsg we can capture dns traffic flow and store ...