0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Using the socratic method « knowledge is inside you », we will make this course not as a outpouring of knowledge but a process of queries and inquiries that lead to answers through the power of imagination and intuition. Think and grow wise thus unquoting Napoeleon HILL. Any effective CSS must have these very three interrelated elements ...


There are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than a CPU in terms of computation. So, we'll use the power of GPU to speed up WPA/WPA2 cracking.The tools used will be (available for both windows and Linux.) Aircrack-ng ...


[udesigniconfont name="fa fa-user"] Contribution Credit: @mrsn82 We've all heard about firewalls, whether in our home computers with does terrible balloons which tells us that our computer is at risk or in the company where we work and have blocked access to internet when trying to get into our social networks to see the photos of our ...


NTP and Its Function There are many network services running silently and without any interaction. One of them is the NTP (Network Time Protocol) service. Many often forget how important this protocol is. What is NTP? In the most basic description, NTP is a networking protocol that helps us keep the time up-to-date. However. its' importance ...


As I installed the latest release of Kali Linux 2.0, 64 Bit, I found out that it's no longer pre installed with TrueCrypt. I need TrueCrypt to open my 200 GB encrypted volume using four keyfiles.To continuously use an encrypted volume created from TrueCrypt, I recommend to try using VeraCrypt instead. I've tested this and it normally runs similarly ...


There is a cyber defense podcast that launched a couple of months ago called CyDefe , and they have been doing some really cool things. Their focus, and tagline, is "Making cyber defense simple". I had the pleasure of joining this podcast for an episode, primarily focused on end user security, the other day. That episode will launch Thursday, 8/20/15. ...


I am CodeNinja a.k.a. Aakash Choudhary and today i am going to contribute my little knowledge to this awesome site Information gathering is the 1st step :-> Lets say i have a site :-> www.sitename.com Your aim is to pentest this site as i hired you for this purpose ...


This a short post about what you can do to protect your privacy in today's world. Though nothing is 100% safe and as long as people are using technology, their privacy can be threatened. Yet, without technology - life's just no good. 1. Stop Using GOOGLE and FACEBOOK They are collecting mountains of ...


Hello and welcome to another one of my contributions. This time, we're going to focus on how to discover web application vulnerabilities. If you haven't read my last contribution into how to manually perform SQL Injection, I recommend you to do that after reading this. It's easy to have a tool actually do stuff for you, but you ...


Social Engineering Toolkit (SETOOLKIT) Credential Harvester using Kali There's a 2 types of Social Engineering Attack a Human Based and Computer Based, this time we are going to use Computer Based Attack using very good tools in performing Social Engineering Attacks.Requirements: 1. An Active Internet Connect. 2. Kali Linux ( Download ) Overview ...