Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

September 21, 2015
By: Rafik
5945

Take the Right Roads Toward Your Infosec Career
It’s hard to administer systems nowadays without security. Managing and administering systems almost always includes a security component, if not an outright security focus. Are you interested in moving from a systems administration position into a more security-focused role? And, do you want to design your career in information systems? As an example, consider that many Enterprise Resource Planning Systems (ERP), such as Microsoft Dynamics AX, SAP and Oracle have sec ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
3313

By: Wushi09
Internet Protocols: Versions 4 and 6 Analysis and Comparison of IPv4 and IPv6   Usman Jibril Department of Management Information Systems Cyprus International University Lefkosa, North Cyprus. wushi09@outlook.com Akintoye Oluwasegun Ogundiya Department of Management Information Systems Cyprus International University Lefkosa, North Cyprus. s ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
61832

By: Rana Daniyal Khan
Don’t try this on networks on which you lack permission for penetration testing.   Intro: MAC: “MAC is a 42 bit address used to uniquely identify a device. “ “MAC filtering is a way in which the network administrator allows only specific mac address to connect to the router.”    Let’s divide thi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
By: nullvyte
29804

Anatomy of Error-Based SQL Injection
What is SQL Injection? SQL injection is a subset of the “code injection” attack method. SQL stands for Structured Query Language and is used by databases to store and retrieve information. Many websites require this capability web developers use a server-side scripting language – often PHP or ASP – to pass user input to a backend database. A very common example of a website using this capability is a site where you need to create a user account and p ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
By: KaalBhairav
95039

Tutorial: Setting up a Virtual Pentesting Lab at Home
  Hi Pentesters, While pursuing the course on Ethical Hacking and Penetration Testing, we often feel the need to have our own pentesting lab to practice all the stuff we’re learning during the course. I am no exception, so I began searching for a way I could do this. After gathering some info, I found a way and wanted to share it with you.   Prerequisites: A Windows or Linux host machine. In this tutorial, I’m using Windows 10 as the host. Minimum of 8 ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
3730

By: Zeeshan Alam
Security Operations Centers are essential part for dealing with cyber security threats where enterprise information systems are monitored, assessed and defended. SIEM (Security Information and Event Management), which is a combination of SIM (Security Information Management) and SEM (Security Event Management) provides near real-time analysis ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
7479

By: Krintoxi
Hello, this is a short guide on how to use the Python Scripting language to facilitate Tasks in Linux. I’ll start by giving a small overview on what Python is: According to Wikipedia,”Python is a widely used general-purpose, high-level programming language. Its design philosophy emphasizes code readability, and its syntax allows p ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 18, 2015
By: The Steve
1433

What Really Happens When I Press Enter
Please note: some of the backslahes ( \ ) in the coding below may have been removed by the WordPress program. When you press enter, the program doesn’t just run. There’s an order of operations that takes place. Understanding this order can keep you from making some pretty big mistakes. Let’s take a command and break apart what really happens when we press enter. $ echo “The current directory is $PWD and I can count to 4.” \ (hit enter) > {1..4} The c ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel