0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Quickly Reverse Engineer an APK File
By: MohammadYahya
October 12, 2016

Have you ever given any thought as to how your Android Application works?  Required: Installed java in your system apktool dex2jar jd-gui   Download all from here  Step 1: -Change extension of apk to zip Step 2: -Open that zip and copy classes.dex in dex2jar folder-Open CMD ...

Creating a Desktop App Blocker Simple Guide in Juliar
By: Rattar
October 12, 2016

Hey guys,Today we will be building a simple Desktop App Blocker. This will work on any operating system: Windows, Mac, Linux/Unix.  It is not necessary to use a specific operating system. That is a beauty of Juliar.  It is the same Juliar script  which will work on any operating system. An Android version of Juliar is coming soon so you will be ...

Cybersecurity Excellence Awards 2017
By: rcubed
October 11, 2016

Cast your vote for the 2017 Cybersecurity Excellence Awards, here! The need to increase awareness around the importance of cybersecurity is being championed by an increasing number of organizations and among them is the Department of Homeland Security (DHS).They have even designated the month of October as National Cyber Security ...

SQL Injection Lab Part 4 – Using SqlMap to Obtain Current User and Database
By: bjacharya
October 11, 2016

Welcome back Cybrarians ! Section 10: Using SqlMap to Obtain Current User and Database  Verify sqlmap.py exists Instructions: cd /pentest/database/sqlmap ls -l sqlmap.py Obtain Database User For DVWA Notes(FYI): ...

Are We There Yet?
By: JBingham
October 11, 2016

Are We There Yet?   Here you are, about to graduate from college.  Congratulations.  You are now ready to begin your career.  Let’s say you have decided to go into the field of Information Technology (IT).  You’ve always been good with fixing any issues that arise on your home computer, and at school, ...

The Career Path of the Penetration Tester
By: WhiteHat4Ever
October 10, 2016

The path of a penetration tester is a path of many possibilities and options that can lead to the primary goal of obtaining and advancing in cyber security as a penetration tester. I've been asked more than once about the necessary steps to enter into the world of cyber security yet there isn't a single guideline that suits everyone. ...

Configuring Port Security
By: cybern4
October 9, 2016

Cisco switches offer a tool called port security using it we can: Limit who connects (based on layer 2 address) Control how many can connect to a port Set an action when a violation occurs   Port security is used to mitigate MAC ...

Mac OS Sierra Guide to Juliar WebServer
By: Rattar
October 8, 2016

Hey all,As you may have heard, Juliar officially now supports Macintosh, specifically macOS Sierra. NOTE: This guide will probably work with older version of MacOS X, its just not been tested on it.In order to take a full advantage of  the Juliar web server capabilities, we are going to disable the server that comes with MacOS and enable ...

ITT Tech Closing and Impact on Students
By: rcubed
October 7, 2016

The ITT Technical Institute (ITT Tech for short) announced on September 6, 2016 that it was immediately ceasing operations and closing all of its campuses. Less than two weeks later, on September 16, 2016, ITT Tech filed for bankruptcy protection and so ended the run of the oldest for-profit educational companies in the United States. ...

Who is Your Mechanic: InfoSec Level Equivalents
By: infosectdk
October 7, 2016

Question: Who is the most important person in an organization? Is it the CEO? Is it the Finance director? Is it Bob in Sales? Is it you? We are all cogs in the machine, but sometimes there are some key components a company can not do without.A few years ago I read a quote  from the book Solider by ...