0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

State of the Art Wi-Fi Security
By: siva
September 22, 2016

Wifi is everywhere these days. From homes to large enterprise corporate networks, wifi is quick and easy to install, easy for employees to use, and more constantly supported on mobile. However, the greater availability of Wifi means increased danger from attacks, and increased challenges to an organization, and IT security professionals. The main ...

Pentesting Scanner for SQLi/XSS/LFI/RFI
By: Babak Esmaeili
September 21, 2016

v3n0M v4.0.6 – Popular Pentesting scanner in Python3.5 for SQLi/XSS/LFI/RFI and other Vulns V3n0M is a free and open source scanner. Evolved from baltazar’s scanner, it has adapted several new features that improve fuctionality and usability. It is mostly experimental software.This program is for finding and executing various vulnerabilities. It scavenges the web using dorks and organizes ...

OWASP's 13th Annual AppSecUSA Conference
By: Tatianna
September 20, 2016

We’d like to invite you to OWASP ’s 13 th Annual AppSecUSA Conference taking place in Washington, DC, October 11-14. The event is comprised of two days of training sessions followed by a two-day conference where software security leaders, researchers and technologists discuss cutting-edge ideas, initiatives and technological advancements to secure web applications. This is ...

Create your first interactive program in *Juliar *
By: Rattar
September 20, 2016

Today, we will create our first interactive program in Juliar . First we will need latest version of Juliar We can get this by going to www.juliar.org/downloads.ju  and downloading the Linux or Windows version.Open notepad or your favorite text-editor program and copy and paste the following:  How old are you?ask x condition=>= 18 *get ...

Social Media and Apps "Stealing" Your Information - Mobile Security Test Tools
By: jadenturner
September 20, 2016

[clear] This particular list is due to the seriousness of mobile security testing which is a grossly overlooked and ignored area and probably one of the if not the most important.  As I predicted in my 2014 article "Security Testing for Critical for 2015" - security is still in it's infant stages.  Seems we are still in the reactive ...

Using the Cybersecurity Framework
By: Eric
September 18, 2016

Using the Cybersecurity Framework Organizations can leverage the Framework to assess, identify, and manage risk associated with cybersecurity.  The Framework can be used to develop a new security program or to supplement an existing cybersecurity program. Basic Review of Cybersecurity Practices The organizations current cybersecurity state can be compared with the ...

Fingerprinting Attacks on Screen Resolution
By: Choudhary Muhammad Osama
September 18, 2016

Fingerprinting assaults are methods for recognizing people by some sort of characteristic of their online movement. In a few ways, fingerprinting assaults are the most hazardous and troublesome sort of de-anonymizing dangers to safeguard against. I need to highlight one feature of fingerprinting that is utilized by numerous web administrations and associations: screen determination following.As a rule, you have ...

Is Your Smartphone Actually Vulnerable?
By: gags
September 16, 2016

There was a time (way, way back) when Android developers used to only root their mobile devices! But, like everything else, as time passed, Android users increased and users became more sophisticated as they wanted to know what rooting was.I was saddened about the fact that 50-60% of Android phone users in India do not know what rooting even is. ...

Practical Web Application Penetration Testing Series
By: Babak Esmaeili
September 16, 2016

Hello Friends, Today, I'm gonna start series of how to do Practical Web Application Penetration Testing  on an online website in black box mode.  For pentesting a website, we need to perform the following steps: Find the technology and the programming language used.  ...

Tips & Tricks for Passing the CISSP
By: Prineshkv
September 15, 2016

All the hardwork has finally paid off. Passed the exam 2 weeks ago. Took me about 1.5 months to study (rushed it quite the bit) but it shows it is achievable. Study Materials ISC2 Official CBK 2015 book - This was my initial study book Ditched it after my ...