Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

June 30, 2015
By: dsojer
57780

How to Update Burp Suite in Kali Linux
This information might already be in the forums or quickly retrieved via searching online. Yet, after a few minutes of not finding a link, a how-to, etc online, I decided to attempt to update Burp Suite in Kali on my own. When I opened the application today, it prompted to download a new version. I ran software updates and apt-get update on Kali, but I had to manually update Burp Suite. You can quickly launch Burp Suite via Applications > Web Applications under numerous s ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 29, 2015
2537

By: Ξ B ☢ B Ξ
“Humans are, and always will be, the weakest security link.”   It’s amazing how many companies I’ve worked with during Pen-testing/Ethical Hack engagements that have either foregone the social engineering aspect of the hack or limited the social engineering test to a single instance in a single category. And, it really ge ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 26, 2015
6129

By: TRANSLTR
This article will illustrate 9 surprisingly prevalent techniques used by attackers to carry out social engineering offenses.   Human-Based and Computer-Based Social Engineering   1. Impersonation: “An impersonation attack is an attack in which an adversary successfully assumes the identity of one of the legitimate parties in a sys ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 25, 2015
By: xc0de
8057

A Method for Bypassing Keystroke Recognition Based Security System Using Social Engineerin ...
A Method for Bypassing Keystroke Recognition Based Security Systems Using Social Engineering Abstract: In this paper, we aim to use the power of Social Engineering to bypass a Keystroke Recognition based authentication system. We have designed a virtual chat system (basically a chat bot), coded in Python, which performs the much needed social engineering on the victim. A wise victim may think that the bot is trying to extract confidential credentials from him and so provides ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 24, 2015
By: fr4nc1stein
77388

Reset Windows Passwords with Kali Linux
Reset Your Windows Password Using Kali Linux Hello Cybrary members. Here I am again to talk about Passwords for Windows 7 or any version of Windows. Sometimes, we forget our password, or we want to reset the Windows password for a friend, officemate or anyone’s laptop in legal way.  Today, I’m am going to teach you how to reset a password using our Favorite Penetration Testing Operating System – Kali Linux.   Requirements: 1.Kali Operating System (cli ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 23, 2015
109001

By: fr4nc1stein
SSLSTRIP in a Man in the Middle Attack   Hello guys, In this tutorial, I’m going to teach you how to use a SSLSTRIP via the Kali OS. We’ll use SSLSTRIP for sniff or steal password in a Target PC via LAN (Local Area Network). SSLSTRIP is known in hijacking HTTP traffic on a network. For testing, we’ll try to use VMWARE a ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 22, 2015
5856

By: DocGreenBanner
This is a primer for new job seekers and a refresher for seasoned job seekers.   People often ask, “How do I find and get Info Sec jobs?” This document will: identify online and offline job sources provide key elements of a good resume Element #1 – Good Job Sources Online Job Sources There are many online job sour ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 22, 2015
By: fr4nc1stein
6192

Launch a Web Application Bruteforce Using Burp Suite
Hello to all Cybrary Members. This is my process on how to launch a bruteforce attack on any web application. Today, web applications are using a defense mechanism we called Authentication and using Login Pages. I’m going to teach you how this bruteforce attack by using a simple proxy tools.   Requirements: 1. Burp Suite (click here to download) 2. Worldlist (search in Google for the username and password Wordlist) 3. Common sense   Step 1: Ensure the Burp S ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel