Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary 0P3N is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; Cybrary 0P3N provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

Profile image for bachan
February 27, 2017
By: bachan
125

Watering Hole Attack
Hello, Guys! I think many of you have heard the recent news that a group, known as Lazarus, infected a Polish bank’s website and targeted 150 different IPAddresses around 31 countries. The trick used by the group was called the Watering Hole Attack. Let’s take a look at what a watering hole attack is. It is a popular computer attack in which the attacker collects information about/from the victim from the website he/she usually browses. Here, the victim could b ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for pnp-007
February 27, 2017
157

By: pnp.007
Kali Linux & Parrot Security OS, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments. Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information se ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for deleriumendless
February 26, 2017
2445

By: deleriumendless
Raw Log Anatomy: My SIEM system reads my raw logs, why do I need to understand them? **NOTE: Examples used in this posting are very old, but the principles remain sound. I had a choice between using very old logs that I could leave whole, or make significant changes to newer logs to obfuscate identifiable information. Some Initial Notes About ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for pnp-007
February 25, 2017
By: pnp.007
4713

Kali Linux – Hacking OS Tutorial Series
 UA Tester A tool for User Agent WAF, IDS/IPS, and Redirection testing. UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop bots etc. Well, this tool also delivers a lot of information. It is basically a python script which runs through various user-agents on a specified site. It also tries various options like setting cookie, redirection, URL-stability(whether the URL expires or not) and a lot more. Wh ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for priyajatoliya
February 24, 2017
By: priyajatoliya
3799

Crack the CEH Exam
EC-Council stands for International Council of E-Commerce Consultants that is a member-based professional organization of global reach. Certified Ethical Hacker (CEH) is an EC council certification that is awarded to indicate your adeptness in network security, particularly in checking malicious hacking attacks, through preventive countermeasures. A certified ethical hacker can infiltrate a network and inspect extant vulnerabilities at the behest of the required firm. How ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for bjacharya
February 24, 2017
3237

By: bjacharya
Wifi Hacking | Packet Capture + Handshake parts 1 & 2 – Creating Dictionary Files Hello and welcome to my new video series Parts 1 and 2. This series is about creating our own dictionary file that is used for checking wifi security or can be used to crack it!
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for bjacharya
February 23, 2017
2322

By: bjacharya
This video module is a brief overview of the most common commands to work with files:   Commands Like “file, touch, cp, rm, mv/rename” for creating new files, editing, copying, removing and moving/renaming. In the next section, I will talk about the most important part of the Kali Linux command line: MAN PAGES Catch up with ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for darkfusion
February 23, 2017
By: Suminder Singh
2338

How to Delete Linux and Fix Windows Boot System
Hello, users! This is my first post on Cybrary, so please leave comments at the bottom letting me know how I did with this. I’m going to tell you how to fix your dual windows system if you want to delete your Linux OS and save your Windows OS. Let’s get started! Nothing tough, just follow my steps and you’ll do great. First, make a Windows bootable USB with the Window’s OS. After creating this, plug it into the system that you want to fix, and boot W ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Watering Hole Attack
Views: 122 / February 27, 2017
Ethical Hacking – Kali Linux 2.0 Tutorials
Views: 153 / February 27, 2017
Raw Log Anatomy: Understanding my SIEM System
Views: 2444 / February 26, 2017
Kali Linux – Hacking OS Tutorial Series
Views: 4703 / February 25, 2017
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel