Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 27, 2015
By: Grnd D3sk Hck3r
1054

Compound Security Strategy (CSS)
Using the socratic method « knowledge is inside you », we will make this course not as a outpouring of knowledge but a process of queries and inquiries that lead to answers through the power of imagination and intuition. Think and grow wise thus unquoting Napoeleon HILL. Any effective CSS must have these very three interrelated elements : Dedication Each person much show a certin amount of dedication to the good of the company to abide by laws and regulations pertaining to ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
50382

By: darkangel4
There are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than a CPU in terms of computation. So, we’ll use the power of GPU to speed up WPA/WPA2 cracking. The tools used will be (available for both windows and Linux.) Aircrack-ng Oclhashcat This guide assumes the following things ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 26, 2015
1201

By: Mario
Contribution Credit: @mrsn82 We’ve all heard about firewalls, whether in our home computers with does terrible balloons which tells us that our computer is at risk or in the company where we work and have blocked access to internet when trying to get into our social networks to see the photos of our friend that just went on a trip last ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 25, 2015
By: Falko
3822

Network Time Protocol (NTP)
NTP and Its Function There are many network services running silently and without any interaction. One of them is the NTP (Network Time Protocol) service. Many often forget how important this protocol is.   What is NTP? In the most basic description, NTP is a networking protocol that helps us keep the time up-to-date. However. its’ importance is very high. It’s one of the oldest protocols in use. Every device connected to internet network should use this pro ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 24, 2015
By: rubins
15441

Recommended: TrueCrypt Replacement in Kali Linux (2.0, 64 Bit Version)
As I installed the latest release of Kali Linux 2.0, 64 Bit, I found out that it’s no longer pre installed with TrueCrypt. I need TrueCrypt to open my 200 GB encrypted volume using four keyfiles. To continuously use an encrypted volume created from TrueCrypt, I recommend to try using VeraCrypt instead. I’ve tested this and it normally runs similarly to TrueCrypt. The current stable release is VeraCrypt version 1.13. Download from their official download website: ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 19, 2015
113881

By: fr4nc1stein
Google Dorks: An Easy Way of Hacking The Google Search Engine finds answer to our questions, which is helpful in our daily lives. You can search for your school assignments, reports, presentations and more. Before I start the tutorial on using use Google Dorks in Penetration Testing and Ethical Hacking, I’m going to share a definition o ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 17, 2015
3891

By: CodeNinja
I am CodeNinja a.k.a. Aakash Choudhary and today i am going to contribute my little knowledge to this awesome site  Information gathering is the 1st step :-> Lets say i have a site :-> www.sitename.com Your aim is to pentest this site as i hired you for this purpose Then what will be your step ? Here i am telling you. Keep mind that y ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 17, 2015
By: Fiest Kazama
7921

15 Ways to Protect Your Privacy Right Now
This a short post about what you can do to protect your privacy in today’s world. Though nothing is 100% safe and as long as people are using technology, their privacy can be threatened. Yet, without technology – life’s just no good.   1. Stop Using GOOGLE and FACEBOOK They are collecting mountains of data on you, selling it to advertisers and loaning it to government agencies. Seriously, limit or stop all use of these services. Instead of using Google ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel