Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary 0P3N is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; Cybrary 0P3N provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

How to Use Wifite to Hack Wireless Networks
Hi, Cybarians. I am back with a new post. In this post, I’ll tell you about the most famous wifi hacking tool wifite and how you can use it to hack all kinds of wifi security – WEP, WPA, WPA2, WPS What is Wifite? Wifite is for Linux only. It was designed for use with pentesting distributions of Linux, such as Kali Linux, Pentoo, BackBox; any Linux distributions with wireless drivers patched for injection. The script appears to also operate with Ubuntu 11/10, Deb ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for bytezealot
April 22, 2017
1021

By: bytezealot
Definitions of the pertinent concepts used in this article: Authenticity: Property that ensures that an identity of a subject or resource is, in fact, the real identity claimed. It applies to individuals (users), but also to other entity (applications, processes, systems, etc.). Integrity: Methods of ensuring that data is real, accurate, cons ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for cdoyle
April 22, 2017
768

By: cdoyle
Module 10: Security and Recovery Access Control Authentication Something you know Something you have Something you are Single Sign-On Allows a shared login to many networks Federation Uses SSO to allow users or devices to other network resources When 2 companies agree that users can login to 1 network and access info from another serv ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for olynch
April 21, 2017
By: Olivia
1890

UNM4SK3D: InterContinental Hotels, Bose, and Ransomware
#hacked Nelly might regret staying at the Holiday Inn, and you might too. This week, InterContinental Hotels Group (IHG), owners of Holiday Inn and Crowne Plaza, have notified the public of malware found on payment card systems at 1,174 franchise hotels in the United States. This is the second breach IHG has disclosed so far this year, the first in February. The latest malware incident was discovered between September 29th and December 29th of 2016, but customers were just ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for joelson
April 21, 2017
By: Joelson
1702

Instalando e Fixando audio no Kali Linux
English translation below- Instalando e Fixando o som do Kali Linux – PULSEAUDIO Depois de tentar todos os métodos do youtube, descobri que os drivers de áudio do kali não são reconhecidos por minha placa mãe. Então vou mostrar como resolvi. 1. Primeiro temos que saber se seu driver de som esta instalado. a. Vá em configuração, sons, e olhe sei tem algum driver de entrada e saída instalado. Caso não esteja aparecendo tente a opção b. b. Vá no terminal e digit ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for cdoyle
April 21, 2017
608

By: cdoyle
Module 7: Allocation and Optimizing Unit Overview VM and Host Resource Allocation Resources Memory CPU Disk Space Quotas Quotas are the total amount of resources that a Vm can use Hard – maximum amount of resources Soft – allows a user to exceed maximum amount Licensing Allows an origination to use the software Most expensive part of the ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for hemangdoshii99
April 20, 2017
2461

By: Hemang Doshi
What is the 30-day strategy for CISA success? We have specifically designed 30 question banks for each day with details as follow: (1)All questions have been designed considering CISA exam pattern. (2)From day 1 to day 10, each day contains 10 questions. From day 11 to day 30, each day contains 20 questions. The total course contains 450 ques ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for bhammond604
April 19, 2017
By: Brandon Hammond
2565

Tutorial I Never Found: Programming A Google Scraper
Introduction Earlier this month, I was hired by a client to write a program that scrapes Google results. I had one week, and I chose Python as my language of choice. He didn’t want anything too fancy, just a program that scraped the URLs from Google search results. The first step I took was to look for an official Google search API, only to find that there was one, but Google depreciated it, replacing it with one that only searches a single website (the search feature ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel