Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cybrary is Seeking a Wordpress Web Developer, Full-Time in Maryland
By: ryan c
December 30, 2015

ATTENTION: Web Developers in the Washington DC / Baltimore, MD area!! Here is a chance to come work for us!!We are seeking a talented Wordpress developer to join our team, and work with us to continue to build our rapidly growing community and learning website. The person we hire must be able to work at our Greenbelt, MD ...

[podcast] Interview with ISC2 Board member Dave Kennedy
By: BrBr
December 28, 2015

Dave Kennedy does a lot for the infosec community. As owner/operator of 2 companies (Binary Defense Systems and Trusted Security), he also is an organizer of#DerbyCon as well as creator and active contributor to the Social Engineering ToolKit (#SET).  You can also find him discussing the latest hacking attempts and breaches on Fox News and other mainstream media outlets.But this ...

The Complete CCENT Cheat Sheet (For CCNA Part 1)
By: CrazyHorse019
December 24, 2015

  Let's begin...   Routers - Communicate over layer 3 (IP)- Drop broadcast messages- Connects LAN’s to WAN’s  Switches - Communicate over Layer 2 (MAC)- Distributes broadcast messages- creates multiple collision domains  Hubs - Dumb devices with NO logic- data is sent to all connected device  Bridge - Local solution connecting two local networks together.  Notes: A switch ...

Classic Encryption Techniques
By: HamzaMegahed
December 24, 2015

Classic Encryption Techniques All encryption techniques are based on 2 methods, which can be used separately or together: 1- Substitution 2- Transposition 1- Substitution Encryption Techniques: Substitution is an encryption technique where elements in the plaintext are replaced or mapped with another elements. There are many types of the substitution techniques such as (monoalphabetic cipher and ...

Social Engineering Attacks
By: chiheb chebbi
December 22, 2015

  Social Engineering:     Social Engine ering is the art of hacking humans.It i refers to psychological manipulation ...

The Ultimate Guide to Installing Kali Linux 2.0
By: chiheb chebbi
December 22, 2015

Set Up Your Machine  Kali Linux is the most advanced penetration testing distribution. It comes from the Offensive Security team. It's a Debian-based distribution that comes with a various penetration testing tools (John the Ripper, Namp, Wireshark, Burp Suite etc...). Offensive Security (who are also the funders, founders and developers of backtrack ...

3 Major Concepts of Cryptography
By: HamzaMegahed
December 21, 2015

3 Major Concepts of CryptographyLet's talk in detail about 3 major concepts: Computer Security OSI Security Architecture Cryptography   1. Computer Security A definition of computer security consists of 3 points. We can name this as the CIA security concept (Confidentiality, Integrity and Availability): 1- Confidentiality: assure that confidential information ...

Bytes Omelette: Discovering Hidden Messages
By: andresBello
December 21, 2015

Sometimes, we have to face cases and investigations against people who know how to cover their tracks, and have knowledge on how to avoid forensic discovery. Nowadays, there's lots of people making illicit attacks, using tactics to make things in anti-forensic way. One of those tactics is using low-level encryption programs to change the ...

How Symmetric Encryption Works
By: HamzaMegahed
December 21, 2015

Symmetric Encryption Symmetric encryption or symmetric key or single-key encryption is an encryption system where the encryption and the decryption processes are preformed using the same key.  Symmetric Encryption Model:   1- Plaintext (P):  The original message or data. The plaintext is an input to the encryption algorithm. 2- Encryption Algorithm (E):  This algorithm preforms various ...

E-Mail Crime Investigation- A Case Study
By: Amrit Chhetri
December 18, 2015

E-Mail Crime Investigation- A Case Study Researched and Authorized by:Amrit Chhetri, Principal IT Security Consultant, Certified Computer Forensics Investigator/Consultant, Chief Penetration Tester, Social Media Consultant/Strategist 1. Case Summary: Mr. Raja Chhetri worked as a Team Leader in an international BPO firm. He was a social media freak, smart and well performing entry-level management executive and had good taste ...