Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

[PODCAST] Episode 22 The one after the long break
By: CyDefe
April 21, 2016

On this weeks episode we discuss checking for malware in your firmware with Google's VirusTotal, Getting pwned by hearthstone hacking tools, Fake Flash Update Serves OS X Scareware, and the FBI trying to scrub its employees data off of the web.Check out the podcast at

A Big Thank You to Joe Taylor!
By: ryan c
April 19, 2016

I just wanted to take a minute to thank Joe Taylor @jbtaylor051 for making a substantial donation today. Joe purchased a huge amount of Cybytes, and the team here at Cybrary would like to say thank you!

The Penetration Testers Framework (PTF)
By: Johan Grotherus
April 15, 2016

The Penetration Testers Framework (PTF) is a framework created by Dave Kennedy at TrustedSec. Dave is the author of many other tools, yet PTF is a bit different as it aims to provide easy installation of other tools. It's written in Python and is available on Github. For people who are familiar with Backtrack and miss the /pentest ...

Manual WPA/WPA2 Hacking & Cracking [Evox]
By: Joshua H.
April 14, 2016

Manual WPA/WPA2 Hacking & Cracking   (This is by no means meant to be followed and actually used unless you have the time and resources. Please use this as an informative post. This method is obsolete as there are tools mentioned at the bottom of the post to automate this process. I ...

Registry Hacking Against Sysprep Errors
By: xyra
April 14, 2016

NOTE: This article is meant for system administrators only. DO NOT CHANGE YOUR REGISTRY if you administer your PRIVATE PC! If you want to create images and execute Sysprep, sometimes you may see the following error message displayed when the computer is restarted: The computer restarted unexpectedly or encountered an ...

What You Should Know About the OSI Reference Model and Layers
By: uknin35
April 13, 2016

The OSI Reference Model is not a physical model. It is a logical model. It has seven different layers, divided into two groups. The top three layers define how the applications within the end stations will communicate with each other and with users. The bottom four  define how data is transmitted, end-to-end. Layer 7 Application – Provides a user ...

Python Programming for Hackers (Part 4) – Dictionaries Concept
By: bjacharya
April 12, 2016

Python Programming for Hackers (Part 4) – Dictionaries Concept Well, Welcome All to Part 4. Here, I'll give you the basic concepts on Dictionaries when it comes to programming in Python.[For the Video Lecture on this part, check out this link:  ] - The Python dictionary data structure provides a hash table that can ...

Search Leaks and Lack of User Privacy
April 11, 2016

In today’s world, by using search engines we can find any information we want just by pressing few keys. The search engine is a great invention and we're all quite used to it. It's become a part of our daily lives as we search for many things we need to know.People mostly use the search engine to seek out ...

Exposition on the "Hacker Ethic"
By: True Demon
April 9, 2016

The modern understanding of computer science is a constantly mutating beast. The individuals who've been driving the Information Age's technological innovation are known as "hackers." Most people understand a hacker as someone who breaks into computers and commits data-theft. This is a gross misconception that I intend to ebb and erode away, slowly, like waves ...

[Part 2] - Networking Sniffing and How to Defend Against It
By: Antr4ck
April 8, 2016

Let's continue with more information on Networking Sniffing and How to Defend Against It...  UDP Scanning [-u] UDP is connectionless. Open ports may not respond to connections - ports and farms may not respond, either. But most systems respond with a ICMPPORTUNREACH when sending a packet on port closeure. ...