Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 17, 2015
By: CodeNinja
4033

Steps for web pentesting for particular web target – Information Gathering
I am CodeNinja a.k.a. Aakash Choudhary and today i am going to contribute my little knowledge to this awesome site  Information gathering is the 1st step :-> Lets say i have a site :-> www.sitename.com Your aim is to pentest this site as i hired you for this purpose Then what will be your step ? Here i am telling you. Keep mind that you use text editor or notebook to save result what you see while testing STEP 1 :-> Open website and check every link or pages and c ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 17, 2015
8039

By: Fiest Kazama
This a short post about what you can do to protect your privacy in today’s world. Though nothing is 100% safe and as long as people are using technology, their privacy can be threatened. Yet, without technology – life’s just no good.   1. Stop Using GOOGLE and FACEBOOK They are collecting mountains of data on you, selli ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 12, 2015
15220

By: Kevin Mark
Hello and welcome to another one of my contributions. This time, we’re going to focus on how to discover web application vulnerabilities. If you haven’t read my last contribution into how to manually perform SQL Injection, I recommend you to do that after reading this. It’s easy to have a tool actually do stuff for you, but ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 11, 2015
By: fr4nc1stein
22608

Social Engineering Toolkit (SETOOLKIT) Credential Harvester
Social Engineering Toolkit (SETOOLKIT) Credential Harvester  using Kali   There’s a 2 types of Social Engineering Attack a Human Based and Computer Based, this time we are going to use Computer Based Attack using very good tools in performing Social Engineering Attacks. Requirements: 1. An Active Internet Connect.2. Kali Linux (Download) Overview : The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Pytho ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 11, 2015
By: Kevin Mark
28257

Guide: How to Manually Perform SQL Injection with UNION SELECT
This is not shared with you so that you’ll go out now and do something illegal. I want you to read this and learn to actually train and do this on your own or use with others that have given you a thumbs up to try it out. Hello to all of you and welcome to another contribution. This time, I’ll share how to manually perform SQL Injection using the UNION SELECT method.   For all of you that are doing SQL Injection and using open sources, software or whatever d ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 11, 2015
25905

By: Kevin Mark
Hello and welcome to this tutorial, As you can read in the title, we’re going to perform a ‘Man in the Middle Attack’ using Ettercap, dSniff tools and of course, my favorite, Wireshark. Just to let you know, I’ve performed this attack on a my Mac. For you guys that are using backbox, Kali or others, load up your termin ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 7, 2015
4388

By: ram
Network Security 1.2 Based on CompTIA’s list of Security + exam objectives (their PDF list of domains is found here: http://certification.comptia.org/docs/default-source/exam-objectives/comptia-security-sy0-401.pdf ), I’ll go through each one, giving examples and details where possible, so you know better what each listed item means, doe ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 6, 2015
By: klrgrz
2242

Simple and Effective Password Concept
The problem with passwords is that humans are inherently lazy (hey, me too!) and Security Admins are apparently a special kind of sadist when they think users can remember an insane combination of 1337 and binary. In reality, complex password requirements traditionally lead to greater security risks because users find new ways of cheating to remember their passwords. Whether it means writing them down and stuffing a notepad in their unlocked drawer, or typing them all out in ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel