Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

October 2, 2015
By: Jafar Hasan
14407

An Introduction to DNS HiJacking
Hello Readers… DNS Hijacking (sometimes referred to as DNS Redirection) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it to a rogue DNS server, invalidating the default DNS settings. When an attacker takes control of a computer to alter its DNS settings, the system has been DNS Hijacked. The “Domain Name System (DNS)” is mainly responsible for translating a user friendly domain name such as “google.com” to its correspondin ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 1, 2015
23670

By: Homer
After watching the “The Linux Command Line Interface” Cybrary module, it’s important to practice the commands introduced in the module. What follows is a simple listing of commands you can run through on your own system(s) to build familiarity for the test and confidence on the command line. Down the road, it can be helpful t ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 1, 2015
13345

By: Anon.D
In a “Man in the Middle” (MITM) attack, an attacker intercepts the communication between a client (victim, in this case) and a server. Interception of communication allows an attacker to read, insert and modify the data in the MITM attack. If the communication is not encrypted, then passwords can also be captured. Thus, an attacker ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 1, 2015
By: KaalBhairav
12304

Tutorial: Setting Up a Virtual Web Server for Safe Penetration Testing at Home
Hi Cybrarians!!! I hope you are doing well and studying hard. While pursuing the Penetration Testing course, we often feel the need for our own Web servers, where we can test our skill-sets without worrying about permissions and the law. To this end, I started to gather some information and found out that we can create our own virtual web servers and apply all of our tricks and skills SAFELY. Here’s how to do it: Prerequisites:- Virtual Box installed. (You can use an ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 29, 2015
By: Jafar Hasan
8429

How to Dox
Hello Everyone, This is my second article related to Doxing. See my first post on Doxing here. Doxing is s essentially gathering a bunch of information on a target they generally wouldn’t want you to know. Everything from name, e-mail, ZIP code and even address.   What you need: Basic social engineering Notepad   Try these steps for Doxing: 1. Get an IP address. Do this by going to http://whatstheirip.com and enter your email address. This will then give yo ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 28, 2015
5743

By: Jafar Hasan
I’d like to clarify what Doxing is. Doxing is the procedure of picking up data about somebody or something by utilizing sources on the Internet and utilizing essential reasoning abilities. Its name comes from “Documents” – in short it’s the recovery of “Documents” on a person or organization. You may ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 25, 2015
3991

By: Krintoxi
Hello – Today I’ll be providing a set-by-step guide to Steganography and its crypto. We’ll look at its uses in third world countries and oppressive regimes that have complete control over the Net, including Cuba, Venezuela, North Korea, China, Syria etc. Oppressive systems are known to shut down secure ways of communicating, ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 23, 2015
By: Krintoxi
4009

Prevent Communications Spying with O.T.R. Encryption and TOR in XMPP
With the growing concern of online privacy, this is by far the best way I’ve found to keep your communications private using a combination of O.T.R., TOR, Linux and a trustworthy VPN service. Note – This guide can be used by the following communities of people and others: Activists: Operating around the wold, all governments spying on their citizens. Hackers: Those who push the limits of technology, who need secure ways of communicating. Hacktivists: While hackt ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel