Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

June 23, 2015
By: fr4nc1stein
100640

Tutorial: Using SSLSTRIP in a “Man in the Middle” Attack
SSLSTRIP in a Man in the Middle Attack   Hello guys, In this tutorial, I’m going to teach you how to use a SSLSTRIP via the Kali OS. We’ll use SSLSTRIP for sniff or steal password in a Target PC via LAN (Local Area Network). SSLSTRIP is known in hijacking HTTP traffic on a network. For testing, we’ll try to use VMWARE and download the Kali Operating System. I’m using BT5 (Backtrack) in my presentation.   Requirements: 1. Kali OS  – Cl ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 22, 2015
5458

By: DocGreenBanner
This is a primer for new job seekers and a refresher for seasoned job seekers.   People often ask, “How do I find and get Info Sec jobs?” This document will: identify online and offline job sources provide key elements of a good resume Element #1 – Good Job Sources Online Job Sources There are many online job sour ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 22, 2015
5486

By: fr4nc1stein
Hello to all Cybrary Members. This is my process on how to launch a bruteforce attack on any web application. Today, web applications are using a defense mechanism we called Authentication and using Login Pages. I’m going to teach you how this bruteforce attack by using a simple proxy tools.   Requirements: 1. Burp Suite (click he ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 22, 2015
By: xMidnightSnowx
24253

Tutorial: Evading Anti-Virus Software While Hacking
Hello, When it comes to ” hacking ” into our target’s system, where most of us all fail is evading their Anti-Virus (AV). In this tutorial, I’ll be teaching you various ways to actually by-pass the AV, so you can easily have a meterpreter session running into your target’s system without the Anti-Virus flagging your software. AV software companies generally develop their software to look for a “signature” of viruses and other malware ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 21, 2015
By: DocGreenBanner
4905

CISSP Book Cross Reference Chapter Correspondence
CISSP Book Domain Chapter Mapping Cross Reference All in One SSCP,Gibson All in One CISSP, Harris CISSP Study Guide, Conrad Official ISC2 CISSP CBK Ch 1. Security Fundamentals Forward, introduction Ch 2. Access Controls Ch 3. Access Control Ch 3. Access Control Ch 1 Access Controls Ch 3. Basic Networking and Communications Ch 6 Telecommunications and Network Security Ch 8 Telecommunications and network security Ch 10 Telecommunications & Network securi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 21, 2015
10677

By: Alan Raff
The Idea of Terrorism What images come to mind when someone says “terrorism”? Many people may think of bombs, hostages, and/or other conventional weapons. What people don’t consider might easily be the biggest and most harmful weapon of all: technology. Today, everything revolves around computers. Computers and computer systems ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 19, 2015
4332

By: smoke
Encryption Software and Combating Cyber Crime Abstract Encryption software has been a controversial topic in the legal world since its inception. There are differing views on the legalities of this type of software, each with their own valid viewpoints. There have been many cases decided on this matter in various courts but no federal guideli ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 19, 2015
By: HakTuts
6617

An Introduction to Linux File and Directory
Introduction LINUX is a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released on 5 October 1991 by Linus Torvalds. The Free Software Foundation uses the name GNU/Linux to describe the operating system. Linux is the first truly free Unix-like operating system. The underlying GNU Project ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel