Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

March 27, 2019
By: Uladzislau Murashka
3234

Firewall Basic Bypassing Techniques With Nmap and Hping3
Security of data always have in top of priorities for systems administrator’s. Systems admin’s always tries to keep all the ports close for public use which is not required. There are many firewall solutions available on the market starting from simple iptables and ending with complex cloud solutions. In our current case we will take a look at several interesting tools like nmap and hping and methods on how to find out if port is actually used by something and ano ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 22, 2019
118029

By: The Rapture
By: The Rapture and fellow contributing Cybrarians Today’s Estimated Link Count: 1476 Updated 3/22/2019   I will continue to keep this article up to date on a fairly regular basis. (update: Thank you all for the positive feedback! I hope is has come in handy! I know I constantly come here just to find resources when I need them. I appr ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 22, 2019
3680

By:
This blog originally appeared on the Cisco Security Blog. Reprinted with permission. Original Author : Ben Nahorney Link to his bio There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 20, 2019
By: ghostin
4793

Web Application Testing Methodology (Part 1).
Web Application Testing Methodology(Part 1).   This will act as introduction to the upcoming series of posts. So, What will be in the Series ? Ans. In this series of posts, I’m going to show you step by step method to test a Web Application.   Always remember one thing, Every person has its own way to do the work.       Following mentioned things will be discussed. Mapping the Web Application. Preparing the Attack Surface. Testing the Cl ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 19, 2019
By: Ron
4229

3 Ways in which Jira Instances Can be Exploited
What is Jira? Jira is an issue tracking product developed by Atlassian that allows bug tracking and agile project management. It is being actively used by large number of big and small companies for issue tracking. The popularity of Jira has caused it a major target for hackers. We will discuss some ways in which your Jira instance can be compromised due to misconfigured Jira. 1. XSS via SSRF This can be actively exploited in Jira < 7.3.5 versions. It may be exploited ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 15, 2019
4228

By: Wrenekape
It was one of those deafening silences, those muted explosions, an event where two diametrically opposed ideas held presence, the embodiment of a mutual exclusion. If you can somehow imagine what it sounds like for a soul to crack, you’ll glimpse what it felt like. Right now, in March of 2019, I’m a teacher, and I’ve been a teacher ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 15, 2019
5765

By: Chang Tan Lister
Introduction: Practical SSL/TLS Attacks and Decrypting Web Traffic   Chang Tan changtan@listerunlimited.com For the purposes of this chapter, both the terms SSL (Secure Sockets Layer) and TLS (Transport Layer Security) shall be used interchangably to explain the same thing, that is the end-to-end encryption scheme that secures modern day ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 8, 2019
By:
6795

Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study
Original Author : Steve Martino Today, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes and in all industries all over the world. With over 3200 respondents across 18 countries, the study offers a solid view of what’s on the minds and to-do lists of those on the front lines of Infosec worldwide. This year’s study focused on getting “ready for the unknowns” that exist outside and inside ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel