0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



We get it. We truly do. We're JUST as excited about our new classes as you. We understand the anticipation, the anxiousness and the frustration. You joined Cybrary just fo r Malware Analysis . You refresh the Metasploit course page daily. We get it, because we created ...


SSLSTRIP in a Man in the Middle Attack Hello guys,In this tutorial, I'm going to teach you how to use a SSLSTRIP via the Kali OS.We'll use SSLSTRIP for sniff or steal password in a Target PC via LAN (Local Area Network). SSLSTRIP is known in hijacking HTTP traffic on a network. ...


Many companies, throughout the years, have failed because they failed to innovate and change. Many great market leaders, like Kodak, even held in their hands the future of their industry, and still refused to embrace it. Change is always difficult for someone of something in a position where status quo is providing awesome returns. It takes courage to innovate, and ...


This is a primer for new job seekers and a refresher for seasoned job seekers. People often ask, " How do I find and get Info Sec jobs? "This document will: identify online and offline job sources provide key elements of a good resume ...


The Certified Information Systems Security Professional (CISSP) certification is a strong credential to have for professionals who have a mix of both technical and managerial experience as well as competence in designing, engineering and the overall management of security programs. Their knowledge helps protect company’s important and confidential information from the growing threat of cyber attacks. This certification is perfect ...


Hello to all Cybrary Members.This is my process on how to launch a bruteforce attack on any web application. Today, web applications are using a defense mechanism we called Authentication and using Login Pages. I'm going to teach you how this bruteforce attack by using a simple proxy tools. Requirements: 1. Burp Suite ( click here to download )2. Worldlist ...


Hello,When it comes to " hacking " into our target's system, where most of us all fail is evading their Anti-Virus (AV) .In this tutorial, I'll be teaching you various ways to actually by-pass the AV, so you can easily have a meterpreter session running into your target's system without the Anti-Virus flagging your software.AV software companies generally ...


CISSP Book Domain Chapter Mapping Cross Reference.


The Idea of Terrorism What images come to mind when someone says "terrorism"? Many people may think of bombs, hostages, and/or other conventional weapons. What people don’t consider might easily be the biggest and most harmful weapon of all: technology.Today, everything revolves around computers. Computers and computer systems were designed to work, but not necessarily with ...


Encryption Software and Combating Cyber Crime Abstract Encryption software has been a controversial topic in the legal world since its inception. There are differing views on the legalities of this type of software, each with their own valid viewpoints. There have been many cases decided on this matter in various courts but no ...