0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


to progress through the story wherein you play as a blackhat hacker hired to track down another hacker by any means possible. It contains scripts that are vulnerable to Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), Structured Query Language Injection (SQLi), Remote Command Injection (RCE), and many more. This VMware machine runs on Fedora 14. SIZE : around ...


Hello, LAST UPDATED : Monday, 22/06/2015 , 3:20 PM Indian Standard TimeIf you are reading this post then you are probably searching for the Guide Materials ( such as CEH Instructor Slides, Links to other websites for testing your Pentesting skills etc ). So i've compiled a list of all the Study Guide i found and so i've uploaded them ...


Has anyone taken the \[Advanced Penetration Testing\]----with Georgia Weidman ..... OMG.. her voice sucks the life out of me , after a few sessions i try so hard not to fall asleep... what is wrong with her ???? why does she slur her words ? is she drunk ?? stay of the alcohol girl ....at least when making these videos..... t203 ...


Hello guys, I started a couple of days ago my learning trip in Cybrary. :) At the moment i already completed a course and get its completition certificate. I would like to add that on my Linkedin profile, someone of you know how to do it? Hope someone can clear this point :) Thanks a lot how can i add my ...


Hi, I wanted to know if you could recommend me a laptop which is suitable for pentesting, coding and so in. It should be portable, so no 17", and have a good processing power, maybe a quadcore and 8+ Gigs oft RAM. I found some gaming ultrabooks online, but they either are too expensive or have high-specs GPUs. The battery ...


Does anyone know if you have to take both A+ exams on the same day? Or can you break them up and take them separately? I wanted to learn as much as possible for the first exam, then concentrate on the second. According to this reddit post you can but it is not recommended. The user Phalt explains: "My suggestion would ...


Practise your Infosec skill on these (legal) 28 Hacking Sites People dealing with cyber security can't learn essential things on infosec if they do not practise the core activity they're defending against: hacking. Since this is illegal to perform, sites have been set up to train people in hacking without putting them in legal danger. Here are two links that ...


https://www.checkmarx.com/2015/11/06/13-more-hacking-sites-to-legally-practice-your-infosec-skills/ Thanks :) +1 Thanks! nice one how can hack my friends whatsapp messages? nice one! Thanks for the share! Great list thanks :) And another huge list aimed for penetration testers. Although some resources from the list hasn't been updated for some time and a bit outdated, many of them worth a look. Thanks for sharing For an electrician, who only grounds wires because it is the law, how ...


Metasploit Advanced Penetration Testing Cyber risks: a severe and present danger that everything is under attack. Did you know: "The annual cost of cybercrime to the global economy ranges from $375 billion to as much as $575 billion"? Are you ready to defend Hackers? First, let's define "Hackers?" Hackers are intelligent ...


Hi and welcome to this new how to series of student tutorials. My name is Bijay, and I'll be teaching you a complete series of Python Programming for Hackers . Part 1 is the introduction to the course outline and the set up process. Well, first, why Python? Python ...