0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Launch a Web Application Bruteforce Using Burp Suite
By: fr4nc1stein
June 22, 2015

Hello to all Cybrary Members.This is my process on how to launch a bruteforce attack on any web application. Today, web applications are using a defense mechanism we called Authentication and using Login Pages. I'm going to teach you how this bruteforce attack by using a simple proxy tools.  Requirements: 1. Burp Suite ( click here to download )2. Worldlist ...

Tutorial: Evading Anti-Virus Software While Hacking
By: Akash Raghav M
June 22, 2015

Hello,When it comes to " hacking " into our target's system, where most of us all fail is evading their Anti-Virus (AV) .In this tutorial, I'll be teaching you various ways to actually by-pass the AV, so you can easily have a meterpreter session running into your target's system without the Anti-Virus flagging your software.AV software companies generally ...

CISSP Book Cross Reference Chapter Correspondence
By: DocGreenBanner
June 21, 2015

CISSP Book Domain Chapter Mapping Cross Reference.

A Comprehensive Look at Cyberterrorism, Hactivism and Cyber Espionage
By: Alan Raff
June 21, 2015

The Idea of Terrorism What images come to mind when someone says "terrorism"? Many people may think of bombs, hostages, and/or other conventional weapons. What people don’t consider might easily be the biggest and most harmful weapon of all: technology.Today, everything revolves around computers. Computers and computer systems were designed to work, but not necessarily with ...

Encryption Software and Combating Cyber Crime
By: smoke
June 19, 2015

Encryption Software and Combating Cyber Crime Abstract Encryption software has been a controversial topic in the legal world since its inception. There are differing views on the legalities of this type of software, each with their own valid viewpoints. There have been many cases decided on this matter in various courts but no ...

An Introduction to Linux File and Directory
By: HakTuts
June 19, 2015

Introduction LINUX is a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released on 5 October 1991 by Linus Torvalds.The Free Software Foundation uses the name GNU/Linux to describe the operating system. Linux ...

Introduction to Cryptography
By: HakTuts
June 17, 2015

What is cryptography? Cryptography derives its name from the Greek word “Kryptos,” which means “Hidden Secrets.” Cryptography is the practice and study of hiding information. It's the Art or Science of converting a plain intelligible data into unintelligible data and again re-transforming that message into its original form. It provides: Confidentiality, Integrity, Accuracy. Encryption The process ...

Automatas Finitos
By: Kierc117
June 17, 2015

[udesigniconfont name="fa fa-user"] Contribution Credit: @kierc117  Automata FinitoUn automata finito es un vector de 3 elementosM=(I,S,DELTA,F)donde I es el conjunto finito de entradas (no vacio), S es el conjunto finito de estados, DELTA es la funcion de transicion de estados y F es el conjunto finito de estados finales (incluidos en S)el hecho de que todos los conjuntos sean ...

Education: the first line of defense in wireless network security
By: Rachel Laura M
June 16, 2015

Wireless networks are fast and convenient and allow for many devices to be connected on a network and communicate with each other. However, this technology presents a new set of issues that weren’t present in the wired world. Mainly, threats to security including but certainly not limited to: Information reaching unintended recipients Unauthorized users ...

The Limitations of Modern Cryptography
By: Rachel Laura M
June 16, 2015

Individuals now own multiple electronic devices - from Smartphones, to tablets, to laptops and more. They often bring these items into the workplace, or use them to work from a remote location. Increased threats to a company’s important and confidential information are more prevalent than ever.Protection of this information is crucial - as information can travel across the world ...