0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cryptography Outline
By: cdoyle
September 14, 2015

(outline as of 9/13/2015)   Course Title:Cryptography Section 1-1 Topic:Introduction To Cryptography Learning Objectives:This introduction video provides an outline of the curriculum covered in Cybrary's in-depth Cryptography course. Confidentiality, Integrity, Availability and Authentication How companies use cryptography How penetration testers can ...

An Introduction to Cross Site Scripting
By: nullvyte
September 14, 2015

What is Cross Site Scripting? Cross-site scripting (or “XSS”) is a vulnerability in web applications that's  caused by insecure coding practices, which do not sanitize user input. If a user of a vulnerable web application can pass scripts to the server and the server does not attempt to discover and remove scripts (“sanitizing input”), then the ...

Cygwin on Windows
By: Doktor Frankenstein
September 11, 2015

Cygwin is a large collection of GNU and Open Source tools. Its a good way to get to know Linux.  Cygwin is a DLL module that's a POSIX Emulation DLL from Red Hat that allows programs written for Unix / Linux systems to run on Windows. Originally "Cygnus Support", Cygnus Solutions was founded in 1989. They  developed Cygwin [among other ...

Code::Blocks and MinGW Installation for Windows
By: Doktor Frankenstein
September 9, 2015

This was done on Win7 64bit OS. It's pretty much the same on all Windows, with slight  variants. Code::Blocks is also available for Linux and Mac and has been ported to FreeBSD, OpenBSD, and Solaris.  This is geared towards beginners that want an awesome, free, open source cross-platform IDE that supports multiple compilers including GCC, Clang and Visual C++. Code::Blocks ...

All About Hacking (French Version)
By: waota
September 8, 2015

Beaucoup de jeunes informaticiens ou amateurs rêvent de devenir « pirate informatique »,c’est très souvent pour démontrer qu’on est un as en informatique. Alors ils se mettent à rechercher sur google « technique de piratage ; comment infiltrer un réseau informatique ; comment détourner un serveur ; comment surfer gratuitement ; comment faire ceci ou cela»…le plus ridicule c’est ...

Tutorial: How to Use the Nmap Scripting Engine
By: Johan Grotherus
September 8, 2015

Nmap is probably the most known and capable network scanner available today. It has a ton of features, it's open source and free to use. So, what's not to like about it? One of the features is the NSE, the Nmap scripting engine, which extends Nmap's functionality as a scanner. With the use of NSE, you can not ...

How to Bypass Website Blocking Using a Proxy Server
By: HEGA GEOFFROY
September 8, 2015

Usually, when we want to visit a website, we start our browser, type the address of the website in the URL address bar and wait for a response. In the meantime, the browser sends that web address to the local Domain Name Server (DNS) to convert it into respective IP address.The process of converting a website address or domain ...

Using SSLStrip in Kali Linux
By: nullvyte
September 8, 2015

This tutorial will teach you how to use SSLStrip in Kali Linux. SSLStrip is used to hijack secured HTTPS traffic and sniff the contents of this traffic.You'll need to download Kali Linux, which contains the SSLStrip utility in the standard image. Kali can be installed in a hypervisor, as a stand-alone OS or can be run as a live OS.  Find ...

Why Hundreds of Thousands of People are Learning Hacking, for Free
By: ryan c
September 3, 2015

Perhaps it is somewhat shocking that hundreds of thousands of people are learning hacking, for free on Cybrary. However, there are several very good reasons for this free cyber security learning revolution.A fundamental change in the way cyber security is taught and learned, is upon us. Together, the Cybrary team, and each of our Members, are making this change happen, ...

Password Complexity....Are We Fooling Ourselves?
By: sl0m0
September 2, 2015

Many of the beliefs we have around what constitutes a “good” password are created by what default policies in software such as Microsoft teach us.We are led to believe that a minimum length of 8 characters, a good mixture of UPPER and lower-case, numbers and uncommon (i.e. $@#&!) characters automatically make a good password.Many Systems Administrators ...