Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

July 10, 2015
By: Laird
1270

Definitions in CEH (German Translation)
Skills:                 Verstehen wie Computer arbeiten, sicherer Umgang mit verschiedenen OS,   Hardwarevorausetzungen der OS kennen, Kommunikation mit anderen Sicherheitsspezialisten Klassifikationen:                 Black Hat Hackers: kriminelle, auf persönlichen Profit aus Grey Hat Hackers:  Mischung  aus Black und White Hat White Hat Hacker (Ethical Hacker): Beschützen mit ihren Computer skills            Informationssysteme S ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 10, 2015
10316

By: ^Graff
PowerShell Exploit Using SEToolkit In this tutorial, I’m going to show you how you can compromise any Windows computer that has PowerShell installed on it. The scope of this tutorial is to: Show you how to open a Meterpreter session on a victim’s computer. Help you understand what’s happening with the code, so that you can ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 9, 2015
10277

By: Multi Thinker
Hi once again, In this security article, I’ll define the framework of Metasploit. We’ll cover following topics (there are many more of them and we’ll cover them in my next article): What is Metasploit? What Can We Do with It? Understanding Metasploit CLI Commands and Exploit Attacks Armitage 1. What is Metasploit? Metasp ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 9, 2015
By: Johnny Confidence
3420

An In-Depth Look at Ransomware
What is Ransomware? Ransomware is a generic term for a family of malware, which, once active on your systems, searches for documents and pictures then encrypts them. Once encrypted the malware leaves a note with instructions on how to pay the attacker to receive a key allowing decryption of your files. These tools encrypt not only your local files, but can also attack any network mapped drives and sometimes connected cloud storage solutions. Some notable examples of ransomwa ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 9, 2015
By: DocGreenBanner
3213

Don’t Be the Victim of Cyber Fraud
As a volunteer with a cyber crime-non profit, I’ve recently worked a case involving fraud. I’d like to share the following techniques to avoid fraud from electronic media, such as social media and email. And, the same information can also apply to in-person, phone or mail solicitations.   First of all, if it sounds too good to be true, it very likely is too good to be true. There are no contests or lotteries that someone else entered you in. If they did ente ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 8, 2015
3246

By: Multi Thinker
1. Testing and confirming Xpathi Testing for Xpath and confirming are the most important parts. Most of us, and specially the readers of securityidiots, see SQLi everywhere and anywhere they find an error – even if the error is a Conversional Error, Internal Error or Programming Error. Sometimes, people assume that getting blocked by WA ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 8, 2015
2837

By: Multi Thinker
The XML Example Document We’ll use the following XML document in the examples below. <?xml version="1.0" encoding="UTF-8"?> <bookstore> <book> <title lang="eng">Harry Potter</title> <price>76.99</price> </book> <book> <title lang="eng ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 7, 2015
By: ^Graff
41056

Evil Twin Attack Using Kali Linux
Evil Twin Attack using Kali Linux By Matthew Cranford I searched through many guides, and none of them really gave good description of how to do this. There’s a lot of software out there (such as SEToolkit, which can automate this for you), but I decided to write my own. The scope of this guide is NOT to perform any MITM attacks or sniff traffic. I have references below for those things, this guide is just to set up the Evil Twin for those attacks. Section 1 – I ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel