0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

13 More Hacking Sites To (Legally) Practice Your InfoSec Skills
By:
January 1, 2016

https://www.checkmarx.com/2015/11/06/13-more-hacking-sites-to-legally-practice-your-infosec-skills/ Thanks :) +1 Thanks! nice one how can hack my friends whatsapp messages? nice one! Thanks for the share! Great list thanks :) And another huge list aimed for penetration testers. Although some resources from the list hasn't been updated for some time and a bit outdated, many of them worth a look. Thanks for sharing For an electrician, who only grounds wires because it is the law, how ...

Metasploit: Advanced Penetration Testing
By: chiheb chebbi
December 31, 2015

Metasploit Advanced Penetration Testing Cyber risks: a severe and present danger that everything is under attack. Did you know: "The annual cost of cybercrime to the global economy ranges from $375 billion to as much as $575 billion"?  Are you ready to defend Hackers? First, let's define "Hackers?" Hackers are intelligent ...

Python Programming for Hackers (Part 1) - Getting Started
By: bjacharya
December 30, 2015

Hi and welcome to this new how to series of student tutorials. My name is Bijay, and I'll be teaching you a complete series of Python Programming for Hackers . Part 1 is the introduction to the course outline and the set up process. Well, first, why Python? Python ...

Cybrary is Seeking a Wordpress Web Developer, Full-Time in Maryland
By: ryan c
December 30, 2015

ATTENTION: Web Developers in the Washington DC / Baltimore, MD area!! Here is a chance to come work for us!!We are seeking a talented Wordpress developer to join our team, and work with us to continue to build our rapidly growing community and learning website. The person we hire must be able to work at our Greenbelt, MD ...

[podcast] Interview with ISC2 Board member Dave Kennedy
By: BrBr
December 28, 2015

Dave Kennedy does a lot for the infosec community. As owner/operator of 2 companies (Binary Defense Systems and Trusted Security), he also is an organizer of#DerbyCon as well as creator and active contributor to the Social Engineering ToolKit (#SET).  You can also find him discussing the latest hacking attempts and breaches on Fox News and other mainstream media outlets.But this ...

The Complete CCENT Cheat Sheet (For CCNA Part 1)
By: CrazyHorse019
December 24, 2015

  Let's begin...   Routers - Communicate over layer 3 (IP)- Drop broadcast messages- Connects LAN’s to WAN’s  Switches - Communicate over Layer 2 (MAC)- Distributes broadcast messages- creates multiple collision domains  Hubs - Dumb devices with NO logic- data is sent to all connected device  Bridge - Local solution connecting two local networks together.  Notes: A switch ...

Classic Encryption Techniques
By: HamzaMegahed
December 24, 2015

Classic Encryption Techniques All encryption techniques are based on 2 methods, which can be used separately or together: 1- Substitution 2- Transposition 1- Substitution Encryption Techniques: Substitution is an encryption technique where elements in the plaintext are replaced or mapped with another elements. There are many types of the substitution techniques such as (monoalphabetic cipher and ...

Social Engineering Attacks
By: chiheb chebbi
December 22, 2015

  Social Engineering:     Social Engine ering is the art of hacking humans.It i refers to psychological manipulation ...

The Ultimate Guide to Installing Kali Linux 2.0
By: chiheb chebbi
December 22, 2015

Set Up Your Machine  Kali Linux is the most advanced penetration testing distribution. It comes from the Offensive Security team. It's a Debian-based distribution that comes with a various penetration testing tools (John the Ripper, Namp, Wireshark, Burp Suite etc...). Offensive Security (who are also the funders, founders and developers of backtrack ...

3 Major Concepts of Cryptography
By: HamzaMegahed
December 21, 2015

3 Major Concepts of CryptographyLet's talk in detail about 3 major concepts: Computer Security OSI Security Architecture Cryptography   1. Computer Security A definition of computer security consists of 3 points. We can name this as the CIA security concept (Confidentiality, Integrity and Availability): 1- Confidentiality: assure that confidential information ...