0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Using the Cybersecurity Framework
By: Eric
September 18, 2016

Using the Cybersecurity Framework Organizations can leverage the Framework to assess, identify, and manage risk associated with cybersecurity.  The Framework can be used to develop a new security program or to supplement an existing cybersecurity program. Basic Review of Cybersecurity Practices The organizations current cybersecurity state can be compared with the ...

Fingerprinting Attacks on Screen Resolution
By: Choudhary Muhammad Osama
September 18, 2016

Fingerprinting assaults are methods for recognizing people by some sort of characteristic of their online movement. In a few ways, fingerprinting assaults are the most hazardous and troublesome sort of de-anonymizing dangers to safeguard against. I need to highlight one feature of fingerprinting that is utilized by numerous web administrations and associations: screen determination following.As a rule, you have ...

Is Your Smartphone Actually Vulnerable?
By: gags
September 16, 2016

There was a time (way, way back) when Android developers used to only root their mobile devices! But, like everything else, as time passed, Android users increased and users became more sophisticated as they wanted to know what rooting was.I was saddened about the fact that 50-60% of Android phone users in India do not know what rooting even is. ...

Practical Web Application Penetration Testing Series
By: Babak Esmaeili
September 16, 2016

Hello Friends, Today, I'm gonna start series of how to do Practical Web Application Penetration Testing  on an online website in black box mode.  For pentesting a website, we need to perform the following steps: Find the technology and the programming language used.  ...

Tips & Tricks for Passing the CISSP
By: Prineshkv
September 15, 2016

All the hardwork has finally paid off. Passed the exam 2 weeks ago. Took me about 1.5 months to study (rushed it quite the bit) but it shows it is achievable. Study Materials ISC2 Official CBK 2015 book - This was my initial study book Ditched it after my ...

Tutorial: SQL injection inside UPDATE query
By: danielkhaoticen
September 15, 2016

SQL injection inside UPDATE query [Tutorial] This tutorial will help you with SQLi inside UPDATE query.  SQLi is located in profile settings.Picture of settings panel:[caption id="" align="aligncenter" width="217"] click image to enlarge[/caption]Vulnerable parameter is "E-mail format: " value.  We use Temper data to intercept and change values.Picture of intercepted values: After we click ...

What is happening with technology?
By: Tatianna
September 14, 2016

In a day and age where everything is online, it makes sense to use email; but why is it “a dying media”? Before I answer this question, have you ever wondered why people don’t use email? Well, one reason is all the junk or “spam” as people call it. No, not the food popular in American culture, but ...

How to install and use a MTR client
By: kent
September 14, 2016

Introduction to MTR My Traceroute (mtr) merges the services and performance of the ping and traceroute programs into one networking tool.  Upon starting this diagnostic tool,  mtr investigates the network connection. This typically happens between the host that the mtr runs on, and the (user-specified) destination host. After determining the address of each network hop, a sequence of ICMP ECHO requests is ...

CyDefe Cyber Security Podcast Mini Episode 5
By: CyDefe
September 14, 2016

On this episode we discuss password leaks from Last.FM and Opera browser. You can check it out on our website www.cydefe.com or on youtube [embed]https://www.youtube.com/watch?v=ltThUDGopMM&feature=youtu.be[/embed]We are also doing a Qwertycards giveaway which can be found here https://www.cydefe.com/giveaway/

SQL Injection Lab Part 3 – Extracting/Obtaining PHP Cookie
By: bjacharya
September 13, 2016

Welcome back Cybrarians! Section 9: Obtain PHP Cookie 1. SQL Injection Menu Instructions:1. Select “SQL Injection” from the left navigation menu. 2. Select Tamper Data Instructions:1. Tools –> Tamper Data 3. Start Tamper Data Instructions:1. ...