Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 27, 2015
By: Kevin Mark
8115

Tutorial: Setting up an “Evil Twin” Access Point
Hello and welcome to this tutorial, This time, we’re going to setup an ”Evil Twin.” Basically, an Evil Twin works to copy another access point and fool your target into connecting to it. However, people aren’t oblivious and will choose the wireless with a strongest connection. We can and, we will, fix that in this guide. We’ll cover setting up the access point. We’ll see what can we do to make the wireless signal stronger than the actual owner of the ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
3809

By: Falko
Many…no, all (yeah, I’m an optimist) administrators know what Ping is. They also know about its usage. Basic usage of the Ping utility is for discovering and reaching devices in network. Let’s sum up what we already know about Ping. If it says us “unreachable,” we did something wrong or we’re derailed thank ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
1073

By: Grnd D3sk Hck3r
Using the socratic method « knowledge is inside you », we will make this course not as a outpouring of knowledge but a process of queries and inquiries that lead to answers through the power of imagination and intuition. Think and grow wise thus unquoting Napoeleon HILL. Any effective CSS must have these very three interrelated elements : D ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
By: darkangel4
50780

Use GPU to Speed Up WPA/WPA2 Password Cracking
There are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than a CPU in terms of computation. So, we’ll use the power of GPU to speed up WPA/WPA2 cracking. The tools used will be (available for both windows and Linux.) Aircrack-ng Oclhashcat This guide assumes the following things: wlan0                             is a WiFi interface mon0                             is th ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 26, 2015
By: Mario
1207

What are the Next Generation Firewalls?
Contribution Credit: @mrsn82 We’ve all heard about firewalls, whether in our home computers with does terrible balloons which tells us that our computer is at risk or in the company where we work and have blocked access to internet when trying to get into our social networks to see the photos of our friend that just went on a trip last weekend or watch a match of the European Cup, but the question is how do they know I’m navigating into these websites? Are they ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 25, 2015
3878

By: Falko
NTP and Its Function There are many network services running silently and without any interaction. One of them is the NTP (Network Time Protocol) service. Many often forget how important this protocol is.   What is NTP? In the most basic description, NTP is a networking protocol that helps us keep the time up-to-date. However. its’ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 24, 2015
15660

By: rubins
As I installed the latest release of Kali Linux 2.0, 64 Bit, I found out that it’s no longer pre installed with TrueCrypt. I need TrueCrypt to open my 200 GB encrypted volume using four keyfiles. To continuously use an encrypted volume created from TrueCrypt, I recommend to try using VeraCrypt instead. I’ve tested this and it norm ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 19, 2015
By: fr4nc1stein
126596

Google Dorks: An Easy Way of Hacking
Google Dorks: An Easy Way of Hacking The Google Search Engine finds answer to our questions, which is helpful in our daily lives. You can search for your school assignments, reports, presentations and more. Before I start the tutorial on using use Google Dorks in Penetration Testing and Ethical Hacking, I’m going to share a definition of Google Dork queries that I saw on techtarget.com: A Google Dork query, sometimes just referred to as a dork, is a search string that ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel