Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

September 1, 2015
By: upendra
168780

Cracking a WPA2 WiFi Password with Aircrack-ng
Hola amigos… Aim: To crack a WPA2-psk encrypted WiFi password using Aircrack-ng. Requirements: If  you’re using a Kali Linux in VMware or other virtual machines, then you need to get a compatible USB WiFi receiver (I’m using an Atheros AR9271 wireless network adapter), because WiFi connections don’t show up in virtual machines. Instead, they show those connections as LAN and also in order to do packet injections (we’ll discuss about packet in ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 1, 2015
4526

By: CryptoCodez
// Hey guys, today, I will give you a brief introduction to buffer overflows on Linux x86_64 machines. // So, let’s start with a basic example in C: ______________________________________________________________________________________________________________ // First some standard includes, you should now them… #include #include ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 1, 2015
37672

By: Kevin Mark
  Hello and welcome to another tutorial, You may have read my other contributions on Cybrary. If not, you should check them out: How to Manually Use SQL Injection with the UNION SELECT Method [Guide] How to Find Web-Based Vulnerabilities (Manually and with Tools)   As you might already know, SQL Injection is an open source tool. The ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 31, 2015
By: BrBr
804

Brakeing Down Security Podcast – Episode 2015-037
http://brakeingsecurity.com/2015-037-making-patch-management-work Once you find a vulnerability, how do you handle patching it? Especially when devs have their own work to do, there are only so many man hours in a sprint or development cycle, and the patching process could take up a good majority of that if the vuln is particularly nasty. One method is to triage your patches, and we discuss that this week with Mr. Boettcher. We also talk about how our respective company’ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 28, 2015
By: Johan Grotherus
13424

Using the Metasploit Database
The Metasploit database is a good way of keeping track of the things you get your hands on during a penetration test. The database can hold things like hosts, services, usernames and passwords. One particular useful feature of the Metasploit database is the integration it has with Nmap. You can utilize Nmap scans from within Metasploit and store the results directly in the database.   Let’s see how this works. Step 1 is to make sure that PostgreSQL is running on y ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
8514

By: Kevin Mark
Hello and welcome to this tutorial, This time, we’re going to setup an ”Evil Twin.” Basically, an Evil Twin works to copy another access point and fool your target into connecting to it. However, people aren’t oblivious and will choose the wireless with a strongest connection. We can and, we will, fix that in this guide. We’ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
4073

By: Falko
Many…no, all (yeah, I’m an optimist) administrators know what Ping is. They also know about its usage. Basic usage of the Ping utility is for discovering and reaching devices in network. Let’s sum up what we already know about Ping. If it says us “unreachable,” we did something wrong or we’re derailed thank ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 27, 2015
By: Grnd D3sk Hck3r
1220

Compound Security Strategy (CSS)
Using the socratic method « knowledge is inside you », we will make this course not as a outpouring of knowledge but a process of queries and inquiries that lead to answers through the power of imagination and intuition. Think and grow wise thus unquoting Napoeleon HILL. Any effective CSS must have these very three interrelated elements : Dedication Each person much show a certin amount of dedication to the good of the company to abide by laws and regulations pertaining to ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel