Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

July 24, 2015
By: Kevin Mark
14480

MDK3 Option B method – Beacon Flood (With proof of working too)
MDK3 Option B. Option -b means it’s a beacon flood, it will send to a target a lots of fake APs, which can crash scanners, drivers and make more harm to a target then you imagine, and can suprise you a lot if you don’t take any cauction with this attack. 1. airmon-ng start wlan0 ->>>> Should say this ” (monitor mode enabled on mon0) ” to make sure it’s enabled write: airmon-ng 2. Type now airodump-ng mon0 ( You will now see a list wit ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 23, 2015
48967

By: Kevin Mark
Hello and welcome to this little tutorial! We’re going to use Reaver and Wash. For those of you who don’t what Reaver and Wash are, Google them. In short, Reaver tries different pins until it catches the right one. It TAKES HOURS TO CRACK A PIN, so be patient. You can use OS X, Kali package or whatever. If we are on Kali, type f ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 20, 2015
6525

By: orion
7 Steps to Locking a Folder (Plus a BONUS) 1.Open Notepad. Copy and paste the code below: cls @ECHO OFF title hacking if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK if NOT EXIST MyFolder goto MDMyFolder :CONFIRM echo Are you sure to lock this folder? (Y/N) set/p “cho=>” if %cho%==Y goto ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 17, 2015
By: Er. Ragini
4312

Securing Your Unix Operating System
Hi Team, I’m sharing my knowledge about UNIX OS.  Some important settings could protect your system. It’s also important to know your OS system well, including its security file settings.   Depending on your networking settings, you may be more open to attacks or vulnerabilities, such as: ICMP redirects Source-routed IP packets Smurf attacks and  SYN floods   1. ICMP redirects modify the kernel’s network routing table. Attackers can use ICMP ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 16, 2015
By: Laird
2587

A Short Practice Guide for PenTests
A Short Practice Guide for PenTests Definition: A penetration test is a proven method that looks for security weaknesses, potentially gaining access to the computer’s features and data. Typical starting points for penetration tests are: Active components like router, switches or gateways Security gateways like firewall, packet filter, intrusion detection systems, antivirus software etc. Server like database server, mail server, file server etc. Telecommunication system ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 16, 2015
17156

By: Darshan Bhavsar
Today, I’m going to show you how to Fix a Virtualbox Showing Only 32Bit Guests on a 64Bit Host. In Windows-based Os’s, there’s a function called “Virtualization”. Virtualization is: a hardware virtualization or platform virtualization, which refers to the creation of a virtual machine that acts like a real compu ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 15, 2015
2645

By: Paddy
Abstract This paper highlights the risks involved with connecting to an untrusted network such as public Wi-Fi.  These networks are highly insecure due to data being emitted through airwaves.  This allows for attackers to easily eavesdrop on network communication by creating an evil twin access point and taking advantage of devices using t ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 14, 2015
By: Multi Thinker
8422

Metasploit: Routing Traffic from a Non-Routable Network
According to Offensive-Security: Pivoting is the unique technique of using an instance (also referred to as a ‘plant’ or ‘foothold’) to be able to “move” around inside a network. Basically using the first compromise to allow and even aid in the compromise of other otherwise inaccessible systems. In this scenario, we’ll be using it for routing traffic from a normally non-routable network.   For this, we’ll use exploit “exploit/windows/browse ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel