0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Compound Security Strategy (CSS)
By: Grnd D3sk Hck3r
August 27, 2015

Using the socratic method « knowledge is inside you », we will make this course not as a outpouring of knowledge but a process of queries and inquiries that lead to answers through the power of imagination and intuition. Think and grow wise thus unquoting Napoeleon HILL. Any effective CSS must have these very three interrelated elements ...

Use GPU to Speed Up WPA/WPA2 Password Cracking
By: darkangel4
August 27, 2015

There are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than a CPU in terms of computation. So, we'll use the power of GPU to speed up WPA/WPA2 cracking.The tools used will be (available for both windows and Linux.) Aircrack-ng ...

What are the Next Generation Firewalls?
By: Mario
August 26, 2015

[udesigniconfont name="fa fa-user"] Contribution Credit: @mrsn82 We've all heard about firewalls, whether in our home computers with does terrible balloons which tells us that our computer is at risk or in the company where we work and have blocked access to internet when trying to get into our social networks to see the photos of our ...

Network Time Protocol (NTP)
By: Falko
August 25, 2015

NTP and Its Function There are many network services running silently and without any interaction. One of them is the NTP (Network Time Protocol) service. Many often forget how important this protocol is.  What is NTP? In the most basic description, NTP is a networking protocol that helps us keep the time up-to-date. However. its' importance ...

Recommended: TrueCrypt Replacement in Kali Linux (2.0, 64 Bit Version)
By: rubins
August 24, 2015

As I installed the latest release of Kali Linux 2.0, 64 Bit, I found out that it's no longer pre installed with TrueCrypt. I need TrueCrypt to open my 200 GB encrypted volume using four keyfiles.To continuously use an encrypted volume created from TrueCrypt, I recommend to try using VeraCrypt instead. I've tested this and it normally runs similarly ...

CyDefe Podcast Has a Cool Tee Shirt, Help Support Their Kickoff!
By: ryan c
August 19, 2015

There is a cyber defense podcast that launched a couple of months ago called CyDefe , and they have been doing some really cool things. Their focus, and tagline, is "Making cyber defense simple". I had the pleasure of joining this podcast for an episode, primarily focused on end user security, the other day. That episode will launch Thursday, 8/20/15. ...

Steps for web pentesting for particular web target - Information Gathering
By: CodeNinja
August 17, 2015

I am CodeNinja a.k.a. Aakash Choudhary and today i am going to contribute my little knowledge to this awesome site  Information gathering is the 1st step :-> Lets say i have a site :->  www.sitename.com Your aim is to pentest this site as i hired you for this purpose ...

15 Ways to Protect Your Privacy Right Now
By: Fiest Kazama
August 17, 2015

This a short post about what you can do to protect your privacy in today's world. Though nothing is 100% safe and as long as people are using technology, their privacy can be threatened. Yet, without technology - life's just no good.   1. Stop Using GOOGLE and FACEBOOK They are collecting mountains of ...

How to Find Web-Based Vulnerabilities (Manually and with Tools)
By: Kevin Mark
August 12, 2015

Hello and welcome to another one of my contributions. This time, we're going to focus on how to discover web application vulnerabilities. If you haven't read my last contribution into how to manually perform SQL Injection, I recommend you to do that after reading this. It's easy to have a tool actually do stuff for you, but you ...

Social Engineering Toolkit (SETOOLKIT) Credential Harvester
By: fr4nc1stein
August 11, 2015

Social Engineering Toolkit (SETOOLKIT) Credential Harvester  using Kali  There's a 2 types of Social Engineering Attack a Human Based and Computer Based, this time we are going to use Computer Based Attack using very good tools in performing Social Engineering Attacks.Requirements: 1. An Active Internet Connect. 2. Kali Linux ( Download ) Overview ...