Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 31, 2015
By: BrBr
687

Brakeing Down Security Podcast – Episode 2015-037
http://brakeingsecurity.com/2015-037-making-patch-management-work Once you find a vulnerability, how do you handle patching it? Especially when devs have their own work to do, there are only so many man hours in a sprint or development cycle, and the patching process could take up a good majority of that if the vuln is particularly nasty. One method is to triage your patches, and we discuss that this week with Mr. Boettcher. We also talk about how our respective company’ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 28, 2015
11220

By: Johan Grotherus
The Metasploit database is a good way of keeping track of the things you get your hands on during a penetration test. The database can hold things like hosts, services, usernames and passwords. One particular useful feature of the Metasploit database is the integration it has with Nmap. You can utilize Nmap scans from within Metasploit and st ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
7575

By: Kevin Mark
Hello and welcome to this tutorial, This time, we’re going to setup an ”Evil Twin.” Basically, an Evil Twin works to copy another access point and fool your target into connecting to it. However, people aren’t oblivious and will choose the wireless with a strongest connection. We can and, we will, fix that in this guide. We’ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
By: Falko
3525

Secrets of Magic Called “Ping”
Many…no, all (yeah, I’m an optimist) administrators know what Ping is. They also know about its usage. Basic usage of the Ping utility is for discovering and reaching devices in network. Let’s sum up what we already know about Ping. If it says us “unreachable,” we did something wrong or we’re derailed thanks to a firewall preventing us from pinging our target. Also, Ping is limits the number of hops and packet sizes we send. This is someth ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
By: Grnd D3sk Hck3r
990

Compound Security Strategy (CSS)
Using the socratic method « knowledge is inside you », we will make this course not as a outpouring of knowledge but a process of queries and inquiries that lead to answers through the power of imagination and intuition. Think and grow wise thus unquoting Napoeleon HILL. Any effective CSS must have these very three interrelated elements : Dedication Each person much show a certin amount of dedication to the good of the company to abide by laws and regulations pertaining to ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
48891

By: darkangel4
There are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than a CPU in terms of computation. So, we’ll use the power of GPU to speed up WPA/WPA2 cracking. The tools used will be (available for both windows and Linux.) Aircrack-ng Oclhashcat This guide assumes the following things ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 26, 2015
1151

By: Mario
Contribution Credit: @mrsn82 We’ve all heard about firewalls, whether in our home computers with does terrible balloons which tells us that our computer is at risk or in the company where we work and have blocked access to internet when trying to get into our social networks to see the photos of our friend that just went on a trip last ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 25, 2015
By: Falko
3644

Network Time Protocol (NTP)
NTP and Its Function There are many network services running silently and without any interaction. One of them is the NTP (Network Time Protocol) service. Many often forget how important this protocol is.   What is NTP? In the most basic description, NTP is a networking protocol that helps us keep the time up-to-date. However. its’ importance is very high. It’s one of the oldest protocols in use. Every device connected to internet network should use this pro ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel