Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 12, 2015
By: Kevin Mark
14564

How to Find Web-Based Vulnerabilities (Manually and with Tools)
Hello and welcome to another one of my contributions. This time, we’re going to focus on how to discover web application vulnerabilities. If you haven’t read my last contribution into how to manually perform SQL Injection, I recommend you to do that after reading this. It’s easy to have a tool actually do stuff for you, but you also have to learn how to do it manually – Link: Manually SQL Injection Let’s start…   First, I want to intr ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 11, 2015
21685

By: fr4nc1stein
Social Engineering Toolkit (SETOOLKIT) Credential Harvester  using Kali   There’s a 2 types of Social Engineering Attack a Human Based and Computer Based, this time we are going to use Computer Based Attack using very good tools in performing Social Engineering Attacks. Requirements: 1. An Active Internet Connect.2. Kali Linux ( ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 11, 2015
23088

By: Kevin Mark
This is not shared with you so that you’ll go out now and do something illegal. I want you to read this and learn to actually train and do this on your own or use with others that have given you a thumbs up to try it out. Hello to all of you and welcome to another contribution. This time, I’ll share how to manually perform SQL Inj ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 11, 2015
By: Kevin Mark
25534

Man in the Middle Attack [MITM] using Ettercap, dSniff Tools and Wireshark
Hello and welcome to this tutorial, As you can read in the title, we’re going to perform a ‘Man in the Middle Attack’ using Ettercap, dSniff tools and of course, my favorite, Wireshark. Just to let you know, I’ve performed this attack on a my Mac. For you guys that are using backbox, Kali or others, load up your terminal and enable monitor mode by typing following: airmon-ng start [interface] But, only if the interface isn’t working when perform ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 7, 2015
By: ram
4297

The Unconventional Guide to Network Security 1.2
Network Security 1.2 Based on CompTIA’s list of Security + exam objectives (their PDF list of domains is found here: http://certification.comptia.org/docs/default-source/exam-objectives/comptia-security-sy0-401.pdf ), I’ll go through each one, giving examples and details where possible, so you know better what each listed item means, does and looks like. The examples are not in any particular order, preference, or even recommendation – they’re just quick-and-easily- ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 6, 2015
2154

By: klrgrz
The problem with passwords is that humans are inherently lazy (hey, me too!) and Security Admins are apparently a special kind of sadist when they think users can remember an insane combination of 1337 and binary. In reality, complex password requirements traditionally lead to greater security risks because users find new ways of cheating to r ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 6, 2015
7703

By: Matthew Williams
Using PsTools: With PsTools, there are a number of different utilities included. The two I’ll focus on are: PsExec and PsShutdown. The rest are useful, too, and you can apply these techniques and batch files to them fairly easily. PsExec is used to execute remove cmd commands or processes on domain connected servers or workstations. I ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 6, 2015
By: Amir
23508

My Journey: CCNA and SECURITY+
The moment you think you know something about security, you realize you don’t know anything! I’ll discuss my experience pursuing a CCNA certificate and a Security + certificate. The Beginning In 2011, I began learning about networking through free classes in San Diego’s community college continuing education programs. I started with CCNA classes and hoped to complete levels 1-4. It was a great to do the hands-on labs, learn about different protocols and apply n ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel