0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Tutorial: Setting up an "Evil Twin" Access Point
By: Kevin Mark
Hello and welcome to this tutorial, This time, we're going to setup an ”Evil Twin.” Basically, an Evil Twin works to copy another access point and fool your target into connecting to it. However, people aren’t oblivious and will choose the wireless with a strongest connection. We can and, we will, fix that in ...August 27, 2015

Secrets of Magic Called "Ping"
By: Falko
Many...no, all (yeah, I'm an optimist) administrators know what Ping is. They also know about its usage.Basic usage of the Ping utility is for discovering and reaching devices in network.Let's sum up what we already know about Ping. If it says us "unreachable," we did something wrong or we're derailed thanks to a firewall preventing us from pinging our ...August 27, 2015

Compound Security Strategy (CSS)
By: Grnd D3sk Hck3r
Using the socratic method « knowledge is inside you », we will make this course not as a outpouring of knowledge but a process of queries and inquiries that lead to answers through the power of imagination and intuition. Think and grow wise thus unquoting Napoeleon HILL. Any effective CSS must have these very three interrelated elements ...August 27, 2015

Use GPU to Speed Up WPA/WPA2 Password Cracking
By: darkangel4
There are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than a CPU in terms of computation. So, we'll use the power of GPU to speed up WPA/WPA2 cracking.The tools used will be (available for both windows and Linux.) Aircrack-ng ...August 27, 2015

What are the Next Generation Firewalls?
By: Mario
[udesigniconfont name="fa fa-user"] Contribution Credit: @mrsn82 We've all heard about firewalls, whether in our home computers with does terrible balloons which tells us that our computer is at risk or in the company where we work and have blocked access to internet when trying to get into our social networks to see the photos of our ...August 26, 2015

Network Time Protocol (NTP)
By: Falko
NTP and Its Function There are many network services running silently and without any interaction. One of them is the NTP (Network Time Protocol) service. Many often forget how important this protocol is. What is NTP? In the most basic description, NTP is a networking protocol that helps us keep the time up-to-date. However. its' importance ...August 25, 2015

Recommended: TrueCrypt Replacement in Kali Linux (2.0, 64 Bit Version)
By: rubins
As I installed the latest release of Kali Linux 2.0, 64 Bit, I found out that it's no longer pre installed with TrueCrypt. I need TrueCrypt to open my 200 GB encrypted volume using four keyfiles.To continuously use an encrypted volume created from TrueCrypt, I recommend to try using VeraCrypt instead. I've tested this and it normally runs similarly ...August 24, 2015

CyDefe Podcast Has a Cool Tee Shirt, Help Support Their Kickoff!
By: ryan c
There is a cyber defense podcast that launched a couple of months ago called CyDefe , and they have been doing some really cool things. Their focus, and tagline, is "Making cyber defense simple". I had the pleasure of joining this podcast for an episode, primarily focused on end user security, the other day. That episode will launch Thursday, 8/20/15. ...August 19, 2015

Steps for web pentesting for particular web target - Information Gathering
By: CodeNinja
I am CodeNinja a.k.a. Aakash Choudhary and today i am going to contribute my little knowledge to this awesome site Information gathering is the 1st step :-> Lets say i have a site :-> www.sitename.com Your aim is to pentest this site as i hired you for this purpose ...August 17, 2015

15 Ways to Protect Your Privacy Right Now
By: Fiest Kazama
This a short post about what you can do to protect your privacy in today's world. Though nothing is 100% safe and as long as people are using technology, their privacy can be threatened. Yet, without technology - life's just no good. 1. Stop Using GOOGLE and FACEBOOK They are collecting mountains of ...August 17, 2015
Ready to start learning?
Cybrary Picks