Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 27, 2015
By: Falko
3845

Secrets of Magic Called “Ping”
Many…no, all (yeah, I’m an optimist) administrators know what Ping is. They also know about its usage. Basic usage of the Ping utility is for discovering and reaching devices in network. Let’s sum up what we already know about Ping. If it says us “unreachable,” we did something wrong or we’re derailed thanks to a firewall preventing us from pinging our target. Also, Ping is limits the number of hops and packet sizes we send. This is someth ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
1094

By: Grnd D3sk Hck3r
Using the socratic method « knowledge is inside you », we will make this course not as a outpouring of knowledge but a process of queries and inquiries that lead to answers through the power of imagination and intuition. Think and grow wise thus unquoting Napoeleon HILL. Any effective CSS must have these very three interrelated elements : D ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
51073

By: darkangel4
There are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than a CPU in terms of computation. So, we’ll use the power of GPU to speed up WPA/WPA2 cracking. The tools used will be (available for both windows and Linux.) Aircrack-ng Oclhashcat This guide assumes the following things ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 26, 2015
By: Mario
1214

What are the Next Generation Firewalls?
Contribution Credit: @mrsn82 We’ve all heard about firewalls, whether in our home computers with does terrible balloons which tells us that our computer is at risk or in the company where we work and have blocked access to internet when trying to get into our social networks to see the photos of our friend that just went on a trip last weekend or watch a match of the European Cup, but the question is how do they know I’m navigating into these websites? Are they ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 25, 2015
By: Falko
3910

Network Time Protocol (NTP)
NTP and Its Function There are many network services running silently and without any interaction. One of them is the NTP (Network Time Protocol) service. Many often forget how important this protocol is.   What is NTP? In the most basic description, NTP is a networking protocol that helps us keep the time up-to-date. However. its’ importance is very high. It’s one of the oldest protocols in use. Every device connected to internet network should use this pro ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 24, 2015
15777

By: rubins
As I installed the latest release of Kali Linux 2.0, 64 Bit, I found out that it’s no longer pre installed with TrueCrypt. I need TrueCrypt to open my 200 GB encrypted volume using four keyfiles. To continuously use an encrypted volume created from TrueCrypt, I recommend to try using VeraCrypt instead. I’ve tested this and it norm ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 19, 2015
132648

By: fr4nc1stein
Google Dorks: An Easy Way of Hacking The Google Search Engine finds answer to our questions, which is helpful in our daily lives. You can search for your school assignments, reports, presentations and more. Before I start the tutorial on using use Google Dorks in Penetration Testing and Ethical Hacking, I’m going to share a definition o ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 17, 2015
By: CodeNinja
4030

Steps for web pentesting for particular web target – Information Gathering
I am CodeNinja a.k.a. Aakash Choudhary and today i am going to contribute my little knowledge to this awesome site  Information gathering is the 1st step :-> Lets say i have a site :-> www.sitename.com Your aim is to pentest this site as i hired you for this purpose Then what will be your step ? Here i am telling you. Keep mind that you use text editor or notebook to save result what you see while testing STEP 1 :-> Open website and check every link or pages and c ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel