0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Let's "C" How This Goes Again - Part 2
By: jnox
January 30, 2017

Estimated reading time: 9 minutes Hello, fellow Cybrarians! Way back in December…umm…checks own page 12th - yeah I knew that - December 12th I wrote an article for C programming, an intro to C called ‘ Let’s “C” How this Goes: Programming Introduction to C ’. Recap from the previous article: Skip to new content ...

Error Based SQL Injection: Best practices and projects
By: Romansh Yadav
January 29, 2017

Estimated reading time: 3.5 minutes Hello Leaders,Today I'm going to talk about the second part of the SQL Injection article. First, I want to explain the purpose of Error-based SQL injection. Don't worry, it's very simple.RETRIEVING DATA FROM THE DATABASEToday, we mostly use SQL injection for bypassing the login form or gaining access into an ...

Getting Started with PS Tools
By: H5p
January 28, 2017

  Estimated reading time: 1 minute I found a really good toolset which may come in handy when it comes to doing things remotely. This may help admins and other IT staff that need to do things remotely.Download the PS tools, which can be found easily and downloaded from the internet. 1) PsExec The below command will give ...

Obtaining a Skill Certification is as Easy as Taking a Practice Test
By: Olivia
January 27, 2017

Awhile back, I said that passing a micro certification exam is ‘ so easy a caveman could do it .’ And in a sense that still holds true. However, I know many of us have test anxiety, and for some, obtaining a certification is a matter of job security. That’s a lot of pressure. I’d like to think test taking ...

UNM4SK3D: Dropbox, Russia, and Google Play
By: Olivia
January 27, 2017

#filesharing Recently, Dropbox earned itself a new nickname, 'Dropbug,' also synonymous with 'restore files.' The crowd-favorite file sharing company implemented a bug fix which had corrupted the metadata of their files. This resulted in the files being “quarantined” rather than deleted.  So while you may have thought your folder containing embarrassing love letters ...

Layered Security Part 2 - Defense In-Depth
By: YounessTast
January 27, 2017

Estimated reading time: 6 minutes Hello everyone and welcome to what I hope will be an “Agora” for security enthusiasts and to all people wishing to share a discussion and learn from what we discuss, or better, teach us and share with us their knowledge. In the first ...

Building a Linux Monitoring Infrastructure II
By: Abayomi Ayoola
January 27, 2017

Estimated reading time: 2.5 minutes [Continued from Building a Monitoring Infrastructure I ] Install binaries, init script, sample config files and set permissions on the external command directory. root@Nagios:~/Downloads/nagios-3.0.5#make installroot@Nagios:~/Downloads/nagios-3.0.5#make install-initroot@Nagios:~/Downloads/nagios-3.0.5#make install-configroot@Nagios:~/Downloads/nagios-3.0.5#make install-commandmode 4. Customize Configuration Edit the  /usr/local/nagios/etc/objects/contacts.cfg  config file with your favorite editor and ...

The Many Faces of Social Media: The Good, Profitable and Ugly
By: rcubed
January 26, 2017

This next to last post in the series begun a few weeks ago on “ How to be an Educated Consumer of Online Information ” covers the vast topic of social media. It’s so vast in fact, that apart from a general overview of this particular communications channel, I’ll only be able to discuss Facebook and Twitter ...

Juliar.Future: Guide to building a simple program
By: Rattar
January 26, 2017

Estimated reading time: 1 minute Hey guys,Today we will be learning to program something in Juliar.Future (j.F)j.F allows the use of prefix notation, that means      + 3 2 is equivalent to 3+2. This is useful in Juliar as it allows you to call + on every element. It makes sense to use it on a ...

Who, Not What, is the ‘R’ in RSA?
By: Olivia
January 25, 2017

The other day, I took to Cybrary’s search feature in hopes of finding information on an inventor of the RSA public-key cryptosystem , and when nothing turned up, not only was I utterly disappointed, but it made me wonder why we do not dedicate more of our interest to influential individuals within the field of cyber security. It also ...