Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

October 29, 2015
By: S-Connect
8032

Understanding the Metasploit Framework
Finally, you’re here. Before we step in, I’d like to clear up this misconception about Metasploit: Metasploit is not a tool or software; it’s a ‘Framework.’   Let’s start begin: Architecture   Library REX Basic Library for most tasks Handles sockets, protocols, text transformation and others SSL, SMB, HTTP, XOR, Base64, Unicode   Msf: Core Provides the ‘basic’ API Defines the Metasploit Framework   Msf: Base Provides the ‘Fr ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 29, 2015
4106

By: Krintoxi
Hello, today i will be showing you a small guide to using the NoobSecToolkit tool to Spoof the MAC Address of your device for Anonymity ,Security, and confidentiality reasons. When Nick meets Mack! Every NIC has a hardware address that’s known as a MAC, for Media Access Control. Where IP addresses are associated with TCP/IP (networking s ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 29, 2015
4565

By: Dr3AMCoDeR
In this discussion, I’d like to talk little more about Malware in detail. I hope that this short tutorial is useful for you. I’m not going to tell you what Malware is and how to make it, because (almost) all of you know that Malware is malicious software and that it’s created with advanced programming techniques. The main di ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 28, 2015
By: SniperCS2
28575

The Essential Subnetting Cheat Sheet
  While studying for CCNA many years ago, I created this document to assist me with subnetting.  Hope you find this information helpful.   Address Space – 32 bit IPV4   11111111 11111111 11111111 11111111       Address Grid   28-2=254 27-2=126 26-2=62 25-2=30 24-2=14 23-2=6 22-2=4 21-2=0 128 64 32 16 8 4 2 1 1 = 128/25 0 0 0 0 0 0 0 1 1=192/26 0 0 0 0 0 ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 28, 2015
By: bestiaNXN
3654

Tutorial: A3 Cross-Site Scripting (XSS)
Info Sec Institute runs a great site to learn how to hack websites. It’s called Practical Website Hacking (http://ctf.infosecinstitute.com/ctf2/exercises/ex1.php) and best of all, it’s free. Spoiler alert: This is the solution to the Level 1 challenge. The vulnerability identified at the bottom of the page is A3 Cross-Site Scripting (XSS). The A3 Cross-Site Scripting (XSS) is referencing OWASP‘s 2013 Top 10 most critical web application security flaws. You ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 27, 2015
2366

By: jsec1
Basics First, I’ll begin with the basics. Most applications consist of a Graphical User Interface or GUI, Middle-ware and or integrated logic and a database. These are the key components to being able to understand any application and how it functions. These components also can be combined on either a single workstation/server or split ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 27, 2015
1738

By: Dr3AMCoDeR
Software developers and security experts all over the world are trying to design robust applications, which contain beautiful and intuitive interfaces. They also prioritize making extended and stable functionalities. But, most of all, they try to make the most secure communication between the applications and services, because the informati ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 27, 2015
By: Dr3AMCoDeR
1747

Online Security Essentials – From Secure Browsing to Web Exploitations
We live in a world where technology changes every day. Many new things are developed, and we use technology in various ways that make our life easier. Technology connects us and helps us, but also exposes our identity, privacy and confidential data, which can be a bad thing for us and our future. In this short tutorial, I’ll explain online web security essentials that every standard user should know while browsing the internet. Then, we’ll discuss about how secur ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel