0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Like any other profession, hacking has both practical and theoretical applications. Most of the Open topics deal with the practical side of hacking, so I thought I could help balance that a little by talking about the theoretical side of hacking.I am going to vastly simplify the material in my third year mathematics course "A mathematical introduction to logic" ...


Chapter 3b Hello cybrarians In the last chapter, we set up plugins needed for burp suite. Now we are going to start scanning https://testphp.acunetix.com/ with burp suite. Run burp scanner and set the browser proxy to it. Then, in the URL, ...


Where to start? I read an open topic where the author stated that by making their password longer they made it un-crackable. (In our lifetimes) Now in a perfect world, this is true. However, Cryptography is not perfect. I'll give you a brief rundown on how this works most the time.Server (or Program) asks for a password. You give your ...


Encryption is the process converting your data from human readable form to a more complex form which is very difficult to read.Encryption of the data helps us to keep our personal or confidential data intact without worrying about getting it into unauthorized hands. It fulfills all the points of the CIA triad (Confidentiality, Integrity, and Availability).We have both Hardware and ...


Have you ever given any thought as to how your Android Application works? Required: Installed java in your system apktool dex2jar jd-gui Download all from here Step 1: -Change extension of apk to zip Step 2: -Open that zip and copy classes.dex in dex2jar folder-Open CMD ...


Hey guys,Today we will be building a simple Desktop App Blocker. This will work on any operating system: Windows, Mac, Linux/Unix. It is not necessary to use a specific operating system. That is a beauty of Juliar. It is the same Juliar script which will work on any operating system. An Android version of Juliar is coming soon so you will be ...


Cast your vote for the 2017 Cybersecurity Excellence Awards, here! The need to increase awareness around the importance of cybersecurity is being championed by an increasing number of organizations and among them is the Department of Homeland Security (DHS).They have even designated the month of October as National Cyber Security ...


Welcome back Cybrarians ! Section 10: Using SqlMap to Obtain Current User and Database Verify sqlmap.py exists Instructions: cd /pentest/database/sqlmap ls -l sqlmap.py Obtain Database User For DVWA Notes(FYI): ...


Are We There Yet? Here you are, about to graduate from college. Congratulations. You are now ready to begin your career. Let’s say you have decided to go into the field of Information Technology (IT). You’ve always been good with fixing any issues that arise on your home computer, and at school, ...


The path of a penetration tester is a path of many possibilities and options that can lead to the primary goal of obtaining and advancing in cyber security as a penetration tester. I've been asked more than once about the necessary steps to enter into the world of cyber security yet there isn't a single guideline that suits everyone. ...