Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

October 28, 2015
By: bestiaNXN
3627

Tutorial: A3 Cross-Site Scripting (XSS)
Info Sec Institute runs a great site to learn how to hack websites. It’s called Practical Website Hacking (http://ctf.infosecinstitute.com/ctf2/exercises/ex1.php) and best of all, it’s free. Spoiler alert: This is the solution to the Level 1 challenge. The vulnerability identified at the bottom of the page is A3 Cross-Site Scripting (XSS). The A3 Cross-Site Scripting (XSS) is referencing OWASP‘s 2013 Top 10 most critical web application security flaws. You ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 27, 2015
2353

By: jsec1
Basics First, I’ll begin with the basics. Most applications consist of a Graphical User Interface or GUI, Middle-ware and or integrated logic and a database. These are the key components to being able to understand any application and how it functions. These components also can be combined on either a single workstation/server or split ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 27, 2015
1723

By: Dr3AMCoDeR
Software developers and security experts all over the world are trying to design robust applications, which contain beautiful and intuitive interfaces. They also prioritize making extended and stable functionalities. But, most of all, they try to make the most secure communication between the applications and services, because the informati ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 27, 2015
By: Dr3AMCoDeR
1736

Online Security Essentials – From Secure Browsing to Web Exploitations
We live in a world where technology changes every day. Many new things are developed, and we use technology in various ways that make our life easier. Technology connects us and helps us, but also exposes our identity, privacy and confidential data, which can be a bad thing for us and our future. In this short tutorial, I’ll explain online web security essentials that every standard user should know while browsing the internet. Then, we’ll discuss about how secur ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 23, 2015
By: Krintoxi
10898

NoobSecToolkit: Enhance Linux Security and Facilitate Pentesting
Hello, Today I’ll be showing you how to enhance your Linux Security and facilitate basic penetration testing! To do this, we’ll use an open tool called NoobSecToolkit. The toolkit comes built with the following options: Toolkit Options (sqli)SQL Injector (Tests web urls for SQLI) (vulscan) Vulnerability Scanner (Scans for Vulnerabilities in a Network) (dinfo) Gather Basic Domain Info (Will do an extensive NSLookup on a Target) (discover) Information Harvester (K ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 23, 2015
22361

By: Rattar
Want to show off to your friends – displaying that you’re a super programmer even if you may not know anything about computers? You won’t find this information on Wikipedia, so read on!   Hey guys! Andy here, with another fun guide! All you need is a web browser. I suggest you use Internet Explorer 11 (IE11) for this t ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 19, 2015
4613

By: Rattar
Do you have one password for all your devices? Do you have 100 passwords and sometimes forget them? Do you have trouble remembering passwords? Do you write your passwords on notecards or post-it notes? If you answered yes to any of these questions, then you should read this post. If not, read it anyway, as it may offer something that may chan ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 15, 2015
By: udhayaprakash
2578

Insecure Data Storage on Android Mobile Phones
  Insecure Data Storage on Android Mobile Phones What Does this Mean? Today, cellular networks are becoming a vital element for exchanging the electronic data in low income countries. A problem arises: insecure data storage on mobile phones. This leads to theft of all important data from victims’ phones. I’m here to give a Solution for insecure data storage and transmission between the client and server in android. MDCS (Mobile Data Collection System) it’s a sy ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel