Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 27, 2015
By: darkangel4
51038

Use GPU to Speed Up WPA/WPA2 Password Cracking
There are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than a CPU in terms of computation. So, we’ll use the power of GPU to speed up WPA/WPA2 cracking. The tools used will be (available for both windows and Linux.) Aircrack-ng Oclhashcat This guide assumes the following things: wlan0                             is a WiFi interface mon0                             is th ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 26, 2015
1214

By: Mario
Contribution Credit: @mrsn82 We’ve all heard about firewalls, whether in our home computers with does terrible balloons which tells us that our computer is at risk or in the company where we work and have blocked access to internet when trying to get into our social networks to see the photos of our friend that just went on a trip last ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 25, 2015
3908

By: Falko
NTP and Its Function There are many network services running silently and without any interaction. One of them is the NTP (Network Time Protocol) service. Many often forget how important this protocol is.   What is NTP? In the most basic description, NTP is a networking protocol that helps us keep the time up-to-date. However. its’ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 24, 2015
By: rubins
15770

Recommended: TrueCrypt Replacement in Kali Linux (2.0, 64 Bit Version)
As I installed the latest release of Kali Linux 2.0, 64 Bit, I found out that it’s no longer pre installed with TrueCrypt. I need TrueCrypt to open my 200 GB encrypted volume using four keyfiles. To continuously use an encrypted volume created from TrueCrypt, I recommend to try using VeraCrypt instead. I’ve tested this and it normally runs similarly to TrueCrypt. The current stable release is VeraCrypt version 1.13. Download from their official download website: ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 19, 2015
By: fr4nc1stein
132082

Google Dorks: An Easy Way of Hacking
Google Dorks: An Easy Way of Hacking The Google Search Engine finds answer to our questions, which is helpful in our daily lives. You can search for your school assignments, reports, presentations and more. Before I start the tutorial on using use Google Dorks in Penetration Testing and Ethical Hacking, I’m going to share a definition of Google Dork queries that I saw on techtarget.com: A Google Dork query, sometimes just referred to as a dork, is a search string that ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 17, 2015
4024

By: CodeNinja
I am CodeNinja a.k.a. Aakash Choudhary and today i am going to contribute my little knowledge to this awesome site  Information gathering is the 1st step :-> Lets say i have a site :-> www.sitename.com Your aim is to pentest this site as i hired you for this purpose Then what will be your step ? Here i am telling you. Keep mind that y ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 17, 2015
8035

By: Fiest Kazama
This a short post about what you can do to protect your privacy in today’s world. Though nothing is 100% safe and as long as people are using technology, their privacy can be threatened. Yet, without technology – life’s just no good.   1. Stop Using GOOGLE and FACEBOOK They are collecting mountains of data on you, selli ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 12, 2015
By: Kevin Mark
15185

How to Find Web-Based Vulnerabilities (Manually and with Tools)
Hello and welcome to another one of my contributions. This time, we’re going to focus on how to discover web application vulnerabilities. If you haven’t read my last contribution into how to manually perform SQL Injection, I recommend you to do that after reading this. It’s easy to have a tool actually do stuff for you, but you also have to learn how to do it manually – Link: Manually SQL Injection Let’s start…   First, I want to intr ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel