Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

September 21, 2015
By: nullvyte
31976

Anatomy of Error-Based SQL Injection
What is SQL Injection? SQL injection is a subset of the “code injection” attack method. SQL stands for Structured Query Language and is used by databases to store and retrieve information. Many websites require this capability web developers use a server-side scripting language – often PHP or ASP – to pass user input to a backend database. A very common example of a website using this capability is a site where you need to create a user account and p ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
101171

By: KaalBhairav
  Hi Pentesters, While pursuing the course on Ethical Hacking and Penetration Testing, we often feel the need to have our own pentesting lab to practice all the stuff we’re learning during the course. I am no exception, so I began searching for a way I could do this. After gathering some info, I found a way and wanted to share it w ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
3990

By: Zeeshan Alam
Security Operations Centers are essential part for dealing with cyber security threats where enterprise information systems are monitored, assessed and defended. SIEM (Security Information and Event Management), which is a combination of SIM (Security Information Management) and SEM (Security Event Management) provides near real-time analysis ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
By: Krintoxi
7746

Using Python to Facilitate Tasks in Linux
Hello, this is a short guide on how to use the Python Scripting language to facilitate Tasks in Linux. I’ll start by giving a small overview on what Python is: According to Wikipedia,”Python is a widely used general-purpose, high-level programming language. Its design philosophy emphasizes code readability, and its syntax allows programmers to express concepts in fewer lines of code than would be possible in languages such as C++ or Java.”   Now that t ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 18, 2015
By: The Steve
1540

What Really Happens When I Press Enter
Please note: some of the backslahes ( \ ) in the coding below may have been removed by the WordPress program. When you press enter, the program doesn’t just run. There’s an order of operations that takes place. Understanding this order can keep you from making some pretty big mistakes. Let’s take a command and break apart what really happens when we press enter. $ echo “The current directory is $PWD and I can count to 4.” \ (hit enter) > {1..4} The c ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 18, 2015
10861

By: Joshi
I. Abstract A Security Operations Center (SOC) is an important facility for any organization that wants to address security threats, vulnerability, assessment and management. There are baselines in existence that addresses few of the security aspects, but a complete framework combining people, process and technology currently is not up to the ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 17, 2015
7484

By: Rana Daniyal Khan
SQL Injection: SQL injection is a code injection technique, used to attack data-driven applications in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). Types : [-]Error based [-]Blind based   [1]Error based: In error based we used error through-ed by d ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 17, 2015
By: HEGA GEOFFROY
14545

Firewall Tunneling Using SSH and Putty
SSH (Secure Shell) is a protocol that allows two devices exchange data with each other security in an encrypted format, hence protecting the data being transmitted. It usually uses Port 22 for all communications. For example, if you were to connect to a remote server, then there’s no guarantee that your username and password would be transmitted in secure encrypted format. This is where SSH comes in. It protects your sensitive information like your username and passwor ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel