0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Hello to all Cybrary Members.This is my process on how to launch a bruteforce attack on any web application. Today, web applications are using a defense mechanism we called Authentication and using Login Pages. I'm going to teach you how this bruteforce attack by using a simple proxy tools. Requirements: 1. Burp Suite ( click here to download )2. Worldlist ...


Hello,When it comes to " hacking " into our target's system, where most of us all fail is evading their Anti-Virus (AV) .In this tutorial, I'll be teaching you various ways to actually by-pass the AV, so you can easily have a meterpreter session running into your target's system without the Anti-Virus flagging your software.AV software companies generally ...


CISSP Book Domain Chapter Mapping Cross Reference.


The Idea of Terrorism What images come to mind when someone says "terrorism"? Many people may think of bombs, hostages, and/or other conventional weapons. What people don’t consider might easily be the biggest and most harmful weapon of all: technology.Today, everything revolves around computers. Computers and computer systems were designed to work, but not necessarily with ...


Encryption Software and Combating Cyber Crime Abstract Encryption software has been a controversial topic in the legal world since its inception. There are differing views on the legalities of this type of software, each with their own valid viewpoints. There have been many cases decided on this matter in various courts but no ...


Introduction LINUX is a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released on 5 October 1991 by Linus Torvalds.The Free Software Foundation uses the name GNU/Linux to describe the operating system. Linux ...


What is cryptography? Cryptography derives its name from the Greek word “Kryptos,” which means “Hidden Secrets.” Cryptography is the practice and study of hiding information. It's the Art or Science of converting a plain intelligible data into unintelligible data and again re-transforming that message into its original form. It provides: Confidentiality, Integrity, Accuracy. Encryption The process ...


[udesigniconfont name="fa fa-user"] Contribution Credit: @kierc117 Automata FinitoUn automata finito es un vector de 3 elementosM=(I,S,DELTA,F)donde I es el conjunto finito de entradas (no vacio), S es el conjunto finito de estados, DELTA es la funcion de transicion de estados y F es el conjunto finito de estados finales (incluidos en S)el hecho de que todos los conjuntos sean ...


Wireless networks are fast and convenient and allow for many devices to be connected on a network and communicate with each other. However, this technology presents a new set of issues that weren’t present in the wired world. Mainly, threats to security including but certainly not limited to: Information reaching unintended recipients Unauthorized users ...


Individuals now own multiple electronic devices - from Smartphones, to tablets, to laptops and more. They often bring these items into the workplace, or use them to work from a remote location. Increased threats to a company’s important and confidential information are more prevalent than ever.Protection of this information is crucial - as information can travel across the world ...