Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

July 14, 2015
By: Multi Thinker
6647

Meterpreter: Remote Desktop
Hello Everyone, As I said before, when we have session open in meterpreter or we have access to cmd, we can add rules for the firewall to accept our connection or to disable the firewall. Let’s use method getgui -u -p. -u stands for username and -p stand for password When we’re in someone’s computer cmd ( command prompt), we can add user by using: net user Thinker /add All we need is now is just to place the newly created username in getgui -u Thinker -p &# ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 14, 2015
2770

By: Multi Thinker
Hi once again, Using this method, all we need is an SMB ( LAN ) fully compromised PC user-name, as we have recently exploited WindowsXp SP 2. Now that we know his user-name, we need to move into the LAN to other PCs. Let’s begin… Running the Metasploit console, I assume you have Metasploit opened and have configured our target ther ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 14, 2015
6768

By: Multi Thinker
Hi there, This is Metasploit part 1. In a recent article, we learned about the basics and a little bit of configuration. Here, we’ll be a little more advanced. Meterpreter What’s meterpreter? Meterpreter is a DLL injector, mostly used to hijack windows security.  A list of commands can let us overtake security of Windows and make ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 10, 2015
By: ram
16829

The Unconventional Guide to Network Security 1.1
Leveraging CompTIA’s list of Security+ Exam Objectives (http://certification.comptia.org/docs/default-source/exam-objectives/comptia-security-sy0-401.pdf), I’ll go through each element and provide examples. This article covers the first domain, Network Security (1.0), with its first sub-heading (1.1). The examples are not in any particular order, preference, or recommendation. They’re just quick and easily found examples. I have no affiliations with any of the co ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 10, 2015
By: Laird
1926

Definitions in CompTIA Security+ (German translation)
Sicherheitssysteme und Applikationen: All-in-one Security Appliance – Modulares System, mit verschiedenen Sicherheitslösungen: 1. IPS – intrusion protection system, schützt vor großformatige Angriffe 2. IDS – intrusion detection system, identifiziert Angriffe durch Angriffsmuster Host-basiert: auf jedem Rechner installiert Netzwerk-basiert: Ein Sensor überwacht das gesamte Netz Hybrid: Mischung aus Host-basiert und Netzbasiert 3. Web filtering (Content Filt ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 10, 2015
1124

By: Laird
Skills:                 Verstehen wie Computer arbeiten, sicherer Umgang mit verschiedenen OS,   Hardwarevorausetzungen der OS kennen, Kommunikation mit anderen Sicherheitsspezialisten Klassifikationen:                 Black Hat Hackers: kriminelle, auf persönlichen Profit aus Grey Hat Hackers:  Mischung  aus ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 10, 2015
8212

By: ^Graff
PowerShell Exploit Using SEToolkit In this tutorial, I’m going to show you how you can compromise any Windows computer that has PowerShell installed on it. The scope of this tutorial is to: Show you how to open a Meterpreter session on a victim’s computer. Help you understand what’s happening with the code, so that you can ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 9, 2015
By: Multi Thinker
9276

5 Elements to Explore in Metasploit Basics
Hi once again, In this security article, I’ll define the framework of Metasploit. We’ll cover following topics (there are many more of them and we’ll cover them in my next article): What is Metasploit? What Can We Do with It? Understanding Metasploit CLI Commands and Exploit Attacks Armitage 1. What is Metasploit? Metasploit is software that works with hardware to find additional vulnerabilities and aids in figuring out the kinds of machines our victim/ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel