Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

October 23, 2015
By: Krintoxi
10957

NoobSecToolkit: Enhance Linux Security and Facilitate Pentesting
Hello, Today I’ll be showing you how to enhance your Linux Security and facilitate basic penetration testing! To do this, we’ll use an open tool called NoobSecToolkit. The toolkit comes built with the following options: Toolkit Options (sqli)SQL Injector (Tests web urls for SQLI) (vulscan) Vulnerability Scanner (Scans for Vulnerabilities in a Network) (dinfo) Gather Basic Domain Info (Will do an extensive NSLookup on a Target) (discover) Information Harvester (K ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 23, 2015
22542

By: Rattar
Want to show off to your friends – displaying that you’re a super programmer even if you may not know anything about computers? You won’t find this information on Wikipedia, so read on!   Hey guys! Andy here, with another fun guide! All you need is a web browser. I suggest you use Internet Explorer 11 (IE11) for this t ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 19, 2015
4682

By: Rattar
Do you have one password for all your devices? Do you have 100 passwords and sometimes forget them? Do you have trouble remembering passwords? Do you write your passwords on notecards or post-it notes? If you answered yes to any of these questions, then you should read this post. If not, read it anyway, as it may offer something that may chan ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 15, 2015
By: udhayaprakash
2603

Insecure Data Storage on Android Mobile Phones
  Insecure Data Storage on Android Mobile Phones What Does this Mean? Today, cellular networks are becoming a vital element for exchanging the electronic data in low income countries. A problem arises: insecure data storage on mobile phones. This leads to theft of all important data from victims’ phones. I’m here to give a Solution for insecure data storage and transmission between the client and server in android. MDCS (Mobile Data Collection System) it’s a sy ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 12, 2015
By: Hollywood27kt
2166

To Cloud or Not to Cloud with SharePoint
One of the most frequent questions I get when working with clients who are currently using SharePoint Server is what the advantages and disadvantages of moving to the cloud, or mainly SharePoint Online/Office 365. SharePoint Online has been a technological forefront when it comes to web content management, and for good reason, too. I’ve seen a lot of improvements over just the past few years that I’ve used SharePoint, and have also seen some changes that are not ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 12, 2015
6776

By: Kouzelnik
Phone hacking has been around since creation of the phone line. Now, with VoIP technology, we face new issues. Let’s take a closer look at Cisco connections and troubleshooting of basic problems. Much depends on the connection and hardware you’re working with. Cisco phones are connected to the switch and managed via CME or CUCM. B ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 12, 2015
9767

By: GodSpeed
Before we start, here’s a fun fact: It wasn’t a researcher or an analyst to first use the term ‘Cyberspace,’ it was a science fiction author named William Gibson. It was used in 1982 in a short story; he later elaborated on the term in his novel ‘Neuromancer.’   Ironically, whatever he wrote as a fiction, is anything but fict ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 8, 2015
By: Krintoxi
17212

Stop ISP Espionage and Transparent Proxies Using DNS Cryptography
  Stop ISP Espionage and Transparent Proxies Using DNS Cryptography Hello, Today, I’ll show you how to properly setup a DNSCrypt to prevent monitoring and logging on your DNS by your default provider. We’ll do this by changing our DNS provider to an off-shore or other DNS service that does NOT log our requests, and encrypts DNS queries and responses. Before we explore how this works, we have to understand a bit about DNS and what it is.   DNS: Short f ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel