0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Practical Social Engineering Tactics
By: MohammadYahya
October 13, 2016

Attackers know that hacking a WiFi key is just a temporary thing. Maybe they think, why not hack the entire connection instead? Well, here are some basic "tried and true" social engineering tactics that actually work, and you should be aware of. Don't get taken advantage of by these simple actions. 1. The Cold Call:  On hacking something, port ...

Rule/Behavior Based Payment Authentication
By: Niyaz
October 13, 2016

The world is rapidly evolving with technology inventions. Many of such advancements are happening in the payment industry. In the 90s, no one would have believed using mobile phones to make payments for day to day shopping,  but the fact is, it is happening now. The time is very near when no one will ...

CIA Triad: Easy as ABC
By: infosectdk
October 13, 2016

Does everyone know what CIA means?Well I hope you do.There are lots of acronyms, and often they have different meanings in different settings.WTF can mean Web Threat Framework, from a data management view it can also mean “Where’s the file?” and of course there is that other meaning, which I don’t need to elaborate on.But ...

Cybercrime and the Gaming Industry
By: rcubed
October 13, 2016

Groups with ominous-sounding names such as Lizard Squad, Team Poison, and the Armada Collective are making a virtual killing from cybercrime. But the attack surfaces they target aren’t what you may have come to expect. Rather than going after financial and banking platforms where more challenging safeguards and harsher penalties are in place, these enterprising cybercriminals are ...

Key Management and its Relationship to Cryptography: SDA
By: iheonufrank
October 13, 2016

Key Management and Relationship to Cryptography: Part I | SDA I learned a lot from the Cryptography course so I decided to share with other Cybrary users how it relates to my field in the payment industry using ICCs (Integrated Circuit Cards). SDA stands ...

A Mathematical Introduction to Logic: How Logic Provides a Foundation for Hacking
By: ProgrammerE
October 13, 2016

Like any other profession, hacking has both practical and theoretical applications. Most of the Open topics deal with the practical side of hacking, so I thought I could help balance that a little by talking about the theoretical side of hacking.I am going to vastly simplify the material in my third year mathematics course "A mathematical introduction to logic" ...

Practical Web Application Penetration Testing Series - Chapter 3b
By: Babak Esmaeili
October 12, 2016

Chapter 3b Hello cybrarians In the last chapter, we set up plugins needed for burp suite. Now we are going to start scanning https://testphp.acunetix.com/ with burp suite. Run burp scanner and set the browser proxy to it. Then, in the URL, ...

The Dirt On Password Cracking
By: cybersync
October 12, 2016

  Where to start?  I read an open topic where the author stated that by making their password longer they made it un-crackable. (In our lifetimes) Now in a perfect world, this is true. However, Cryptography is not perfect. I'll give you a brief rundown on how this works most the time.Server (or Program) asks for a password. You give your ...

Protect Yourself from Prying Eyes - Encryption
By: Falcon
October 12, 2016

Encryption is the process converting your data from human readable form to a more complex form which is very difficult to read.Encryption of the data helps us to keep our personal or confidential data intact without worrying about getting it into unauthorized hands. It fulfills all the points of the CIA triad (Confidentiality, Integrity, and Availability).We have both Hardware and ...

Quickly Reverse Engineer an APK File
By: MohammadYahya
October 12, 2016

Have you ever given any thought as to how your Android Application works?  Required: Installed java in your system apktool dex2jar jd-gui   Download all from here  Step 1: -Change extension of apk to zip Step 2: -Open that zip and copy classes.dex in dex2jar folder-Open CMD ...