Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 23, 2015
By: Dallas
13667

Comprehensive List of Tutorials and Learning Resources for the Infosec Pro
Welcome! So, you want to be an…Ethical Hacker, Linux guru, programming master, network admin, expert of all things IT? Here’s a collection of tutorials and learning resources that will get you started on whatever path you’re hoping to take! I’ve personally accessed each site to ensure it’s online and operational at the time of this writing. Some of the links are text-based with screenshots and require you to follow along in your own terminal/comm ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 18, 2015
17521

By: usman47
Ethical Hacking: How To Use Batch Programming Everyone always want to perform ethical hacking easily. This includes using already built tools and exploits for your pentesting. Have you wondered about the easiest way to create a simple virus for Windows? I did and found that simpler things can get a big job done. Today, I am going to tell you ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 18, 2015
1205

By: Rattar
“Because people wanted to write another article about this, I’ve decided to do so. The Modules have changed as well as the language itself. Therefore, I believe it will be useful for beginners and people who are interested in this language to read this.” First thing first. Grab a copy of Juliar Programming language at www.gi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 16, 2015
By: Gov't Mule
2107

Virtualization with Oracle’s Virtualbox
Virtualization with Oracle’s Virtualbox At some point almost everyone decides they want to try something new. Maybe you’ve decided you want to try a Linux distribution, or a new version of your present operating system, but you don’t want to chance loosing your present operating system if you don’t like the new one or something goes wrong. You can create a dual-boot system. If you are using Mac OSX or Linux, it’s pretty easy, but it requires shu ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 16, 2015
By: Engel "User0"
1918

Active Manipulation/Reflecting Manipulation
Disclaimer: I do not take responsibility for the use of the following procedures. They may be used with good intentions. If they’re used to damage or abuse, the responsibility lies solely on the user. This post is for educational purposes only. Manipulation can be used in various ways. It can be used in the cyber world and physically; I’ll teach you how to use manipulation in the physical realm.   Scenario: You suspect a user on your network may be stealing ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 9, 2015
2787

By: rubins
The concept here is similar to the one I submitted here, Recommended: Strong Passwords Technique. https://www.cybrary.it/0p3n/recommended-strong-passwords-technique/ The only difference is that this one is for Android. In Android, we must install the app capable of calculating the hash value of text or file. This app is the Hash Droid by Hobb ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 6, 2015
47988

By: Doktor Frankenstein
Installation Minimum requirements: A minimum of 10 GB disk space for the Kali Linux install For i386 and amd64 architectures, a minimum of 512MB RAM CD-DVD Drive / USB boot support This is for anyone who has installed Kali 2.0 and has had issues with it running like a slug, seen their desktop randomly freezing, and who may want a faster wor ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 4, 2015
By: scilley
8509

Integrating a Honey Pot into Your Network
Hello – This post will cover integrating a Honey Pot into your DMZ or internal Network. This information is for security enthusiasts, professionals and administrators.   First, lets define what a Honey Pot is: A Honey Pot is a computer, usually of the Linux variety, that emulates various services and ports (this is not a WikiPedia definition). Truth be told, Honey Pots are not understood for the fantastic tool they actually are and not currently adopted into the C ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel