Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 8, 2018
By: LoQ
3276

Burp Suite for HMAC signature
How to Set Up Extensions and Session Handling for HMAC Signature In this tutorial, we are going to see how to add a Python script to Burp extender and set up the session handling rule to run the extender. Things that we need: Python script from https://github.com/malcomvetter/BurpHmac/blob/master/BurpHmac.py Burp Suite – any type (free/community/pro) https://portswigger.net/burp Modify the Python Script I did some modifications to the script because I want to use the ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 8, 2018
7874

By: veronica90
Cybersecurity is something modern companies have to take seriously. It’s also more than just the stuff the IT department does behind closed doors – it all starts with creating the right cybersecurity culture and adopting the right software for small business.  To build a brand in the market, perfect cost-effective marketing strategies wil ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 7, 2018
3621

By: Veselina Dzhingarova
Three-dimensional (3D) rendering converts 3D models into 2D representations on the viewer’s screen. It may involve effects to make the 3D model in a 2D format look like a photo, or it may not, depending on the application. For example, when showing off an architectural design, adding details like landscaping is intended to make the customer ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 6, 2018
By: sproutx2125
2053

Stopping Scams Against the Layperson
My current career provides me with the opportunity to speak with many people who have become victims of scammers. These scammers utilize Internet technology to gain access to a victim’s computer and lock it from the victim. These victims are then forced into paying money or sending gift cards to unlock their computers. Many times, the person I am meeting with seems like the same person as the last but with a different name. There appears to be a certain type of demograp ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 4, 2018
By: clarkincnet
9207

Are You Properly Using Your Hoodie as a Penetration Tester?
Rapid7 released a research report last month entitled Under the Hoodie – Lessons from a Season of Penetration Testing.   The report outlines some interesting finds from 268 penetration engagements from the period of September 2017 through June 2018. Maybe it’s just me, but using the word “hoodie” in the name of the report conjures an image of college dropouts sitting in their parents’ basements eating Ho Hos and drinking copious amounts of Mountain Dew while t ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
August 1, 2018
6033

By:
It is always difficult to figure out ways to attract new customers. After all, you are competing for the same customers as your rivals are. But there are ways you can gain a competitive edge so that you can consistently find and keep new customers, as well as retain those customers who have been with you from the beginning. Find New Ways to M ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
July 31, 2018
10630

By: Dr. Michael J. Garbade
What is Kali Linux? Kali Linux, initially released in 2013, is a popular Debian-based Linux distribution operating system mainly used by penetration testers and digital forensics experts. The cyber security tool is maintained and funded by Offensive Security Limited, a prominent IT security company. Kali Linux is the reincarnation of BackTr ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
July 31, 2018
By: Ugra Narayan Pandey
3706

CASB Benefits in the Digital World in 2018
A security gateway is established between an organizational infrastructure and a cloud service provider. The name of this gateway is the cloud access security broker or CASB. Enterprises adopt CASB benefits to expand their policies of IT governance and comply with regulations to third-party storage and applications. There is a need for CASB cloud services if you have the following serious concerns or responsibilities: External as well as internal security threats Monitoring ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel