Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

July 20, 2015
By: orion
5913

7 Steps to Lock a Folder (Plus a BONUS)
7 Steps to Locking a Folder (Plus a BONUS) 1.Open Notepad. Copy and paste the code below: cls @ECHO OFF title hacking if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK if NOT EXIST MyFolder goto MDMyFolder :CONFIRM echo Are you sure to lock this folder? (Y/N) set/p “cho=>” if %cho%==Y goto LOCK if %cho%==y goto LOCK if %cho%==n goto END if %cho%==N goto END echo Invalid choice. goto CONFIRM :LOCK ren MyFolder “Contro ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 17, 2015
4150

By: Er. Ragini
Hi Team, I’m sharing my knowledge about UNIX OS.  Some important settings could protect your system. It’s also important to know your OS system well, including its security file settings.   Depending on your networking settings, you may be more open to attacks or vulnerabilities, such as: ICMP redirects Source-routed IP pac ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 16, 2015
2426

By: Laird
A Short Practice Guide for PenTests Definition: A penetration test is a proven method that looks for security weaknesses, potentially gaining access to the computer’s features and data. Typical starting points for penetration tests are: Active components like router, switches or gateways Security gateways like firewall, packet filter, i ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 16, 2015
By: Darshan Bhavsar
16689

How to Fix a Virtualbox Showing Only 32Bit Guests on a 64Bit Host
Today, I’m going to show you how to Fix a Virtualbox Showing Only 32Bit Guests on a 64Bit Host. In Windows-based Os’s, there’s a function called “Virtualization”. Virtualization is: a hardware virtualization or platform virtualization, which refers to the creation of a virtual machine that acts like a real computer within an OS   There are two factors which may cause you to see only 32Bit Guests on a 64Bit Host: Your version of Virtualb ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 15, 2015
By: Paddy
2560

Public, Open Wireless Hotspots: To Connect or Not
Abstract This paper highlights the risks involved with connecting to an untrusted network such as public Wi-Fi.  These networks are highly insecure due to data being emitted through airwaves.  This allows for attackers to easily eavesdrop on network communication by creating an evil twin access point and taking advantage of devices using the auto connect feature.  This paper discovers the information by surveying participants and creating an evil twin to discover how ma ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 14, 2015
7895

By: Multi Thinker
According to Offensive-Security: Pivoting is the unique technique of using an instance (also referred to as a ‘plant’ or ‘foothold’) to be able to “move” around inside a network. Basically using the first compromise to allow and even aid in the compromise of other otherwise inaccessible systems. In this scenario, we’ll be us ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 14, 2015
4297

By: Multi Thinker
Hi Again, Today, using metasploit and meterpreter, I will tell you how to screen capture a victim’s PC / applications. What we need is metasploit and meterpreter configured and opened. This step starts when we have any meterpreter session opened. Every time, after going to CMD, we have Meterpreter Session opened, don’t get confuse ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 14, 2015
By: Multi Thinker
6962

Tutorial: Packet Sniffing
Packet sniffing was never easy before. In the late 90’s, we used tunneling, wire Shark, MITM and SSL Striping. After a payload of reverse_tcp in meterpreter, all we need is to use exploit “sniff” I assume you have msfconsole opened and configured. Let’s begin… Location and using Windows SMB exploit: msf > use exploit/windows/smb/ms08_067_netapi   Setting payload of reverse_tcp: msf exploit(ms08_067_netapi) > set PAYLOAD windows/meterp ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel