0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Broken Authentication and Session Management – Part2
By: Hari Charan
August 4, 2017

From the previous article, we know what exactly a  Session  is. In this article, we will learn about  Session Fixation . For a better illustration, I have created a simple application built on  ASP.NET . You can download the project from my Github,  here . This project has two folders  ‘SecureLoginFunc’  & ‘ InsecureLogin ‘ ...

UNM4SK3D: CIA, HBO, and FireEye
By: Olivia
August 4, 2017

#wikileaks  Just when you thought there wouldn't be any more leaks, Wikileaks dripped again. The latest leak, which sounds like something out of a Hollywood movie, is a tool that disables security cameras and disrupts recordings to prevent its agents from being seen.  No, this isn't the latest James Bond film and despite ...

Backup File Recovery Tool for Windows
By: virat8586
August 4, 2017

Having a backup is a savior for many users when facing Windows corruption. We as users should always keep a backup of our files in the event of corruption or any other kind of data loss, we can restore our data from one of our backups. The whole idea of creating a backup is to restore data during ...

Essential Features of the Right Mobile Banking Apps
By: Alex Wilson
August 3, 2017

Mobile banking apps have become a major need for organizations seeking financial applications development services. For most banks, the biggest concern is how they can offer customers mobile banking services that exceed the customers’ needs and expectations.Mobile apps have also increased competition among banks and each is looking for ways to gain that competitive edge using their mobile banking ...

Repairing a SQL Database
By: lucasdawson1984
August 3, 2017

Database corruption in SQL server can be very frustrating, as a single server is used by multiple users. When SQL database gets corrupt, it affects all the users and leads to unprofitability and under productivity. SQL Database is used by many clients like  Oracle, Sybase, Microsoft SQL Server, Access, Ingres, etc. Since it is used by a vast ...

Software Engineering Learning Path
By: Olivia
August 2, 2017

While Cybrary focuses primarily on cyber security education, we recognize that cyber extends into every aspect of technology, including the growing area of software engineering. Many Cybrarians are especially interested in this area of study, which is not surprising, considering the Bureau of Labor Statistics predicts “employment of software developers alone is expected to grow 22% between ...

IT Fundamentals: What You Need to Know for Tech Success
By: Olivia
August 2, 2017

Gone are the days when being ‘tech-savvy’ was just a ‘nice to have’ trait. Nowadays, as we all know, being familiar with the basic functions of a computer and certain software is essential for everyone from school-aged children to grandma.As I’ve been interacting with users on the site, it seems there is a certain hesitation for those ...

Analyzing AndroidManifest.xml File with Yara and Python
By: anomali8888
August 2, 2017

Important note: Before you try this tutorial, please make sure that Python version 3 and the Yara library are installed on your operating system.Yara is a multi-platform tool that is used for pattern matching in malware analysis to identify and classify malware samples. With Yara you can create description and rules to be applied with. from this point ...

Broken Authentication and Session Management – Part 1
By: Hari Charan
August 2, 2017

According to OWASP, Broken Authentication and Session Management is when  ‘Application functions related to authentication and session management are not implemented correctly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities.’  In other words, an attacker can get unauthorized access of the user due to the flaw ...

Cybersecurity as a Service (CSaaS)
By: jeffcyber-2016
August 1, 2017

Cybersecurity as a Service: The CSaaS Model to Rule the FutureWith the evolution and the industry acceptance of the Software Defined Network (SDN), the line between the physical and the virtual are becoming increasingly blurred. The need to own physical devices and maintain a private network is rapidly being replaced by the cloud and the concept of (X)aaS where ...