Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary 0P3N is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; Cybrary 0P3N provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 18, 2018
By: Sebastián Vargas
449

Hardening WordPress Like a Boss
There is a need to begin to better protect WordPress platforms. With the huge amount of IOC, where the WordPress platforms are attacked, which I have seen closely, I created this guide for free use. If you want to collaborate with me in any endeavor, you can contact me at sebastian.vargas@protonmail.com. If you do not believe me about the amount of vulnerable websites, you can researc ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 17, 2018
855

By: Dr. Michael J. Garbade
Netcat (usually abbreviated as nc) is a powerful information security tool used for reading from and writing to network connections using the TCP or UDP protocol. Usamaazad, who has more than four years of cyber security experience and currently teaches people his skills, says that “contrary to most tools, Netcat is capable of performing mul ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 15, 2018
3884

By:
I’ve heard it more frequently over the past few weeks, “cyber liability insurance doesn’t cover anything.” That statement is usually followed by a story about someone who had a cyber claim that wasn’t covered. A majority of the time, these stories involve social engineering fraud. According to Interpol, social engineering fraud is ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 14, 2018
By: oluwaseunmi
4951

Password and Authentication Hack
A password is known generally to be the secret code you input to gain access to a resource. Authentication is the process of gaining access to a resource. Passwords are a means of authentication. They are usually our only means of authentication for our online accounts. Are they hackable? Yes, very much so. How? Classic hacking of passwords comes in three forms: Birthday attack Dictionary attack Bruteforce attack These are the old methods, but they are the basis of pa ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 13, 2018
By: Sebastián Vargas
3392

Different Angles of Cybersecurity
Here, I present some important ideas with an emphasis on understanding rather than on cybersecurity as a specialty, even though it has different categories with different bodies of knowledge, as expected. So, do you know cybersecurity? I invite you to read this lightweight article to understand the different categories that can be found in cybersecurity. For me, cybersecurity can be broken down into Defensive Cybersecurity Offensive Cybersecurity Administrative Cybersecurity ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 10, 2018
4848

By: Manu
Well, Rakhni is not a new Trojan if you follow cyber security news, but what’s new is that Rakhni has a new cryptomining module added to it! Cryptomining started taking over the ransomware trend with the new developments in cyptocurrencies. With the added module, Rakhni can now analyze the infected machine and choose between encrypting ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 9, 2018
5119

By: Dr. Michael J. Garbade
Zero-day exploits are serious security loopholes that are exploited within the same day they are exposed. They are aptly named “zero day” because the network administrators have zero days to fix the security flaw, which could have already been exploited. JPolansky, who has more than four years of cyber security experience and currently te ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 8, 2018
By: LoQ
2675

Burp Suite for HMAC signature
How to Set Up Extensions and Session Handling for HMAC Signature In this tutorial, we are going to see how to add a Python script to Burp extender and set up the session handling rule to run the extender. Things that we need: Python script from https://github.com/malcomvetter/BurpHmac/blob/master/BurpHmac.py Burp Suite – any type (free/community/pro) https://portswigger.net/burp Modify the Python Script I did some modifications to the script because I want to use the ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel