0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Use XSSer Automated Framework to Detect, Exploit and Report XSS Vulnerabilities
By: gurubaran
May 9, 2017

XSS is a very commonly exploited vulnerability type which is   very widely spread   and   easily detectable . An  attacker can inject untrusted snippets of JavaScript into your application without validation. This JavaScript is then executed by the victim who is visiting the target site. Cross Site “Scripter” (aka XSSer) ...

Kali Linux For Ethical Hacking 1c - Info Gather with SPARTA Lab [Video Series]
By: bjacharya
May 8, 2017

Ok, welcome back to my new video post on using SPARTA for Information Gathering. This is part 01c and you can find my other 2 parts 01a/01b in OP3N . Basically, the target audience of this video is Kali Linux beginners.In this video, we will see a Python Script build tool in Kali Linux ...

The Line Between Security "Privacy" and Socializing
By: abdallahes
May 8, 2017

A topic that has filled my mind for some time is the fine line that is often crossed between privacy and social information. We have seen the Mr robot series and how he reflected that security researcher or hackers don't have a good social life, and we all see how social apps entered our lives. Now we share everything we ...

The Mediation: An Analytical Perspective Concerning Advantages and Limitations
By: themindandbeauty
May 7, 2017

Definitions and Types: Mediation is considered a unique system referring to a method of resolving disputes among conflicting parties. In general, it is the role of the mediator who is the third party to provide assistance, to the parties involved, in order to negotiate an agreement. Mediation refers to a status in which the mediator, who ...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet
By: gurubaran
May 6, 2017

  What is Web Application Penetration Testing? Web Application Pen testing is a method of identifying, analyzing and Report the vulnerabilities which exist on the Web application including  buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, and Cross Site Scripting  (XSS) in the target web Application that is given for Penetration Testing. Repeat ...

UNM4SK3D: Netflix, Ultrasonic Signals, and Google
By: Olivia
May 5, 2017

  #ransomware Hacking group referred to as 'The Dark Overload' took their Netflix addiction to a new level and released 10 of the 13 newest episodes of hit series 'Orange is the New Black' after the company failed to pay the desired ransom. Talk about Netflix and not chill.  The series was set to ...

Cyber-forensics: How the 4th and 5th Amendments "fit in"
By: msab95
May 5, 2017

How Digital Crimes Fit with the Current Legal System Crimes have been evolving throughout our history, as there are new secure ways created to protect the society, the criminals are getting smarter in breaking these new ways. Society till the late 19 th century consisted of all physical items such as paper files, ...

Atom for Elite Coders - Part 1
By: y3bg0l
May 4, 2017

Today I’ll show you how to be more efficient and faster when you want to code. My secret is Atom, an open source text editor, used by the majority of elite coders under the same vim, sublime text etc. Atom has the particularity to contain thousands of packages that will make your job easier. You can download it at, ...

Ubertooth One
By: bachan
May 4, 2017

Bluetooth is a very useful and attracting technology and The Ubertooth One is an open source and widely available Bluetooth testing and research tool. Every Bluetooth device has a 48-bit unique Bluetooth device address, as it's mac address, which consists of 3 sections. Non-significant address part (NSP), upper address part (UAP) and lower address part (LAP). In order to connect to a ...

4. Ethical Hacking with Kali Linux – Updates and GEDIT
By: Priyank Gada
May 4, 2017

In this chapter, we are going to install updates and upgrade our kali Linux install. We will also install Gedit. We will also learn some basic commands for installing, updating and upgrading packages in Linux. What is Gedit? Gedit is a graphical user interface text editor. We are going to use this editor in our course. GEDIT is simple ...