Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 4, 2015
By: RoninSmurf
14206

The 5 Phases of a Phishing Attack
This document is written from the attacker’s point of view, showing the mindset behind a phishing hack. It’s intended to build awareness around computer and online safety. It’s NOT intended for illegal or immoral use. Phishing attacks have become more carefully crafted and effective. They’re no longer just random mass mailer emails attacks. A phishing email may be a targeted attack or a spear phishing attack. These kinds of attacks have made the headlines ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 3, 2015
3623

By: bestiaNXN
This is the Level 2 write-up of the Info Sec Institute Capture the Flag for Practical Web Hacking. I’ll be going over the process I used to “Capture the Flag” and then I’ll explain how the web page is vulnerable. The vulnerability on http://ctf.infosecinstitute.com/ctf2/exercises/ex2.php is Injection and the instructio ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 3, 2015
6070

By: S-Connect
Welcome Back! Here, we’ll analyze and understand the mechanism behind the exploitation scene, especially in Metasploit. Let’s start with a scenario: an attacker executes the exploit + payload against the vulnerable service on the victim’s machine.   Figure 1.0   Above, Fig 1.0, shows a single line diagram, just to ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 2, 2015
By: ram
6172

The Unconventional Guide to Network Security 1.3
Network Security 1.3 Based on CompTIA’s list of Security + exam objectives (their PDF list of domains is found here: http://certification.comptia.org/docs/default-source/exam-objectives/comptia-security-sy0-401.pdf ), this article covers the first domain, Network Security (1.0), with its third sub-heading (1.3). I mention any products and examples because: 1. When you’re starting out it can be difficult to get a grasp of what’s what; 2. If you’re in charge of a vir ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 29, 2015
By: S-Connect
7981

Understanding the Metasploit Framework
Finally, you’re here. Before we step in, I’d like to clear up this misconception about Metasploit: Metasploit is not a tool or software; it’s a ‘Framework.’   Let’s start begin: Architecture   Library REX Basic Library for most tasks Handles sockets, protocols, text transformation and others SSL, SMB, HTTP, XOR, Base64, Unicode   Msf: Core Provides the ‘basic’ API Defines the Metasploit Framework   Msf: Base Provides the ‘Fr ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 29, 2015
4065

By: Krintoxi
Hello, today i will be showing you a small guide to using the NoobSecToolkit tool to Spoof the MAC Address of your device for Anonymity ,Security, and confidentiality reasons. When Nick meets Mack! Every NIC has a hardware address that’s known as a MAC, for Media Access Control. Where IP addresses are associated with TCP/IP (networking s ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 29, 2015
4534

By: Dr3AMCoDeR
In this discussion, I’d like to talk little more about Malware in detail. I hope that this short tutorial is useful for you. I’m not going to tell you what Malware is and how to make it, because (almost) all of you know that Malware is malicious software and that it’s created with advanced programming techniques. The main di ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 28, 2015
By: SniperCS2
28401

The Essential Subnetting Cheat Sheet
  While studying for CCNA many years ago, I created this document to assist me with subnetting.  Hope you find this information helpful.   Address Space – 32 bit IPV4   11111111 11111111 11111111 11111111       Address Grid   28-2=254 27-2=126 26-2=62 25-2=30 24-2=14 23-2=6 22-2=4 21-2=0 128 64 32 16 8 4 2 1 1 = 128/25 0 0 0 0 0 0 0 1 1=192/26 0 0 0 0 0 ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel