Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 16, 2015
By: Engel "User0"
1947

Active Manipulation/Reflecting Manipulation
Disclaimer: I do not take responsibility for the use of the following procedures. They may be used with good intentions. If they’re used to damage or abuse, the responsibility lies solely on the user. This post is for educational purposes only. Manipulation can be used in various ways. It can be used in the cyber world and physically; I’ll teach you how to use manipulation in the physical realm.   Scenario: You suspect a user on your network may be stealing ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 9, 2015
2818

By: rubins
The concept here is similar to the one I submitted here, Recommended: Strong Passwords Technique. https://www.cybrary.it/0p3n/recommended-strong-passwords-technique/ The only difference is that this one is for Android. In Android, we must install the app capable of calculating the hash value of text or file. This app is the Hash Droid by Hobb ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 6, 2015
48126

By: Doktor Frankenstein
Installation Minimum requirements: A minimum of 10 GB disk space for the Kali Linux install For i386 and amd64 architectures, a minimum of 512MB RAM CD-DVD Drive / USB boot support This is for anyone who has installed Kali 2.0 and has had issues with it running like a slug, seen their desktop randomly freezing, and who may want a faster wor ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 4, 2015
By: scilley
8563

Integrating a Honey Pot into Your Network
Hello – This post will cover integrating a Honey Pot into your DMZ or internal Network. This information is for security enthusiasts, professionals and administrators.   First, lets define what a Honey Pot is: A Honey Pot is a computer, usually of the Linux variety, that emulates various services and ports (this is not a WikiPedia definition). Truth be told, Honey Pots are not understood for the fantastic tool they actually are and not currently adopted into the C ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 4, 2015
By: RoninSmurf
14283

The 5 Phases of a Phishing Attack
This document is written from the attacker’s point of view, showing the mindset behind a phishing hack. It’s intended to build awareness around computer and online safety. It’s NOT intended for illegal or immoral use. Phishing attacks have become more carefully crafted and effective. They’re no longer just random mass mailer emails attacks. A phishing email may be a targeted attack or a spear phishing attack. These kinds of attacks have made the headlines ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 3, 2015
3665

By: bestiaNXN
This is the Level 2 write-up of the Info Sec Institute Capture the Flag for Practical Web Hacking. I’ll be going over the process I used to “Capture the Flag” and then I’ll explain how the web page is vulnerable. The vulnerability on http://ctf.infosecinstitute.com/ctf2/exercises/ex2.php is Injection and the instructio ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 3, 2015
6113

By: S-Connect
Welcome Back! Here, we’ll analyze and understand the mechanism behind the exploitation scene, especially in Metasploit. Let’s start with a scenario: an attacker executes the exploit + payload against the vulnerable service on the victim’s machine.   Figure 1.0   Above, Fig 1.0, shows a single line diagram, just to ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 2, 2015
By: ram
6227

The Unconventional Guide to Network Security 1.3
Network Security 1.3 Based on CompTIA’s list of Security + exam objectives (their PDF list of domains is found here: http://certification.comptia.org/docs/default-source/exam-objectives/comptia-security-sy0-401.pdf ), this article covers the first domain, Network Security (1.0), with its third sub-heading (1.3). I mention any products and examples because: 1. When you’re starting out it can be difficult to get a grasp of what’s what; 2. If you’re in charge of a vir ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel