Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

July 7, 2015
By: rubins
6805

Recommended: Strong Passwords Technique
I hope this helps others; I find this helpful and useful for my accounts. My technique of using strong and different passwords for any accounts is done through the use of the message digest or hash value. The calculated hash value of a certain word or file is what I used as my password. A strong password must include the following: small letters capital letters numbers special characters the maximum number of characters required if possible, or longer   Some basic inf ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 3, 2015
5367

By: Er. Ragini
Hi Team, Here’s something interesting about Android phone security. You can protect your phone as well safely store information inside the phone. It’s possible this information won’t be new for all, but trust me, if you don’t know this, it could be very beneficial. If your phone has been lost or stolen, you can: Lock ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 3, 2015
16955

By: Alan Raff
Recently in my internship, I was posed with a significant problem. One of the PCs at the company where I work was hit with a new kind of malware that got past all of our threat detection software. A user complained that our threat detection software was blocking every application like IE and Word, which the individual needed to complete their ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 3, 2015
By: fr4nc1stein
4994

Social Engineering Overview | Mind Attacks
Social Engineering Overview | Mind Attacks What is social engineering? According to Wiki: “In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.”   Accor ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 1, 2015
By: Multi Thinker
3310

XPath Injection (Part 1)
XPath is used to create queries which allow users to manipulate data inside a XML document. In this tutorial, we’ll start with the basics of XPath queries to understand them better. Later on, we’ll move onto the injecting part. Below is a little introduction to XPath from the w3school to understand the terminology used in XPath  Data Manipulation Language. Just as we need to know what a database is (tables, columns, data, queries, etc.) if we want to learn SQL i ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 30, 2015
62523

By: dsojer
This information might already be in the forums or quickly retrieved via searching online. Yet, after a few minutes of not finding a link, a how-to, etc online, I decided to attempt to update Burp Suite in Kali on my own. When I opened the application today, it prompted to download a new version. I ran software updates and apt-get update on K ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 29, 2015
2743

By: Ξ B ☢ B Ξ
“Humans are, and always will be, the weakest security link.”   It’s amazing how many companies I’ve worked with during Pen-testing/Ethical Hack engagements that have either foregone the social engineering aspect of the hack or limited the social engineering test to a single instance in a single category. And, it really ge ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 26, 2015
By: TRANSLTR
6469

9 Surprisingly Prevalent Social Engineering Techniques
This article will illustrate 9 surprisingly prevalent techniques used by attackers to carry out social engineering offenses.   Human-Based and Computer-Based Social Engineering   1. Impersonation: “An impersonation attack is an attack in which an adversary successfully assumes the identity of one of the legitimate parties in a system or in a communications protocol” (Encyclopaedia of Cryptography and Security).   2. Dumpster Diving: Divers go through trash ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel