Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

how to find hostname using ip address in cmd

To find host name from IP you ...READ MORE

Feb 20, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
91,292 views
0 votes
1 answer

how to find ip address in cmd

1. Open the Command Prompt.   a. Click the Start icon, ...READ MORE

Feb 9, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
47,795 views
0 votes
0 answers

How can you exploit file upload vulnerabilities in PHP apps?

I am studying web security and want ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
26 views
0 votes
0 answers

How to script a privilege escalation attack simulation in Linux?

As part of security assessments, I want ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
24 views
0 votes
0 answers

How to configure WAF rules for mitigating RFI attacks?

I’m setting up a Web Application Firewall ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
24 views
0 votes
0 answers

How to automate a vulnerability assessment lifecycle in Python?

I’m looking to build an automated vulnerability ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
21 views
0 votes
0 answers

How do you track failed login attempts using ELK Stack?

I am using the ELK (Elasticsearch, Logstash, ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
14 views
0 votes
0 answers

How to write a Python script for XSS vulnerability detection?

I am developing a security testing tool ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
14 views
0 votes
0 answers

How do you detect brute force login attempts in Apache logs?

I need to monitor an Apache web ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
13 views
0 votes
0 answers

How to automate vulnerability scanning using OpenVAS?

I want to automate vulnerability scanning using ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
11 views
0 votes
0 answers

How do you detect SQL injection attacks?

Securing our web applications against SQL injection ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
16 views
0 votes
0 answers

How to secure a Linux web server?

I’m tasked with ensuring our Linux-based web ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
14 views
0 votes
0 answers

How to detect open ports on a web server using Python?

I need to perform a security audit ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
12 views
0 votes
0 answers

How to use Burp Suite to analyze a web application attack?

I’m currently learning web application security testing ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
11 views
0 votes
0 answers

What are the defensive measures against session hijacking attacks?

I'm developing a web application where session ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
11 views
0 votes
0 answers

How can you automate patch management with PowerShell?

Managing patches across multiple Windows machines manually ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
10 views
0 votes
0 answers

Can apps access other apps RAM on iOS?

I’m currently researching the sandboxing and memory ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
10 views
0 votes
0 answers

Is Safari a safe browser for iPhone?

As an iPhone user, I'm interested in ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
10 views
0 votes
0 answers

How can we protect against the evil twin?

An Evil Twin attack involves an attacker ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
22 views
0 votes
0 answers

What is the most common vulnerability associated with IoT devices?

There are many security risks with IoT, ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
21 views
0 votes
0 answers

What is the purpose of anti-rollback protection in IoT devices?

I’ve seen anti-rollback protection mentioned in IoT ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
19 views
0 votes
0 answers

What techniques are there for preventing radio-signal replay attacks?

Many IoT devices (RFID, smart locks, etc.) ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
15 views
0 votes
0 answers

What if IoT devices are fabricated with random passwords?

One major IoT security flaw is default ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
14 views
0 votes
0 answers

What are the security risks of hole punching in IoT?

I've heard that NAT hole punching is ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
13 views
0 votes
0 answers

How do so many vulnerable IoT devices stay alive and online?

There are reports of millions of vulnerable ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
11 views
0 votes
0 answers

How do IoT devices know the checksum of firmware upgrades?

When IoT devices update their firmware, they ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
11 views
0 votes
1 answer

Should I allow communication on public networks?

When connecting to public Wi-Fi networks, such ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
24 views
0 votes
1 answer

How to map a network passively with Wireshark dumps?

Passive network mapping involves analyzing existing network ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
23 views
0 votes
1 answer

Should I allow apps to communicate through Windows Firewall?

When Windows Firewall prompts you to allow ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
23 views
0 votes
1 answer

How to scan for ports opened by TCP/UDP sockets with Nmap or any other tool?

To effectively scan a system for open ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
23 views
0 votes
1 answer

How do I remove a service connection point in Active Directory?

Removing a Service Connection Point (SCP) from ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
22 views
0 votes
1 answer

What is the difference between active and passive digital footprints?

A digital footprint refers to the trail ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
55 views
0 votes
1 answer

How do firewalls handle encrypted traffic?

Firewalls play a crucial role in network ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
21 views
0 votes
1 answer

Why trust Nmap's reverse lookup for hostnames during discovery?

Nmap, a widely-used network scanning tool, performs ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
38 views
0 votes
1 answer

Can a web server be secured with just a firewall?

Relying solely on a firewall to secure ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
48 views
0 votes
1 answer

Is there any reason not to salt and hash before using bcrypt?

When implementing password hashing with bcrypt, it's ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
45 views
0 votes
1 answer

What is the difference between active and passive Digital Footprints?

A digital footprint encompasses the trail of ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
27 views
0 votes
1 answer

Is WebGL a security concern?

WebGL (Web Graphics Library) is a JavaScript ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
26 views
0 votes
1 answer

Why use manual testing for web server attacks if scanners can detect vulnerabilities?

While automated security scanners are valuable tools ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
37 views
0 votes
1 answer

Can there be multiple private keys for one public key?

In traditional public-key cryptography systems like RSA ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
42 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes, such as Lamport ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
41 views
0 votes
1 answer

Why do digital signatures need different algorithms?

Digital signatures are essential in modern cryptography ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
40 views
0 votes
1 answer

How is the digital certificate sent alongside digital signatures?

When a digital signature is applied to ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
36 views
0 votes
1 answer

How secure is the hashing, salting, and stretching process in this diagram?

Evaluating the security of your password hashing, ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
34 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes (like Lamport signatures, ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
33 views
0 votes
1 answer

Does a digital certificate contain a private key?

Digital certificates are fundamental components of public ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
31 views
0 votes
1 answer

Why don't digital signatures reveal the sender’s private key?

Digital signatures are a cornerstone of modern ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
27 views
0 votes
1 answer

What's the point of salting Double Submit Cookie (CSRF protection)?

The Double Submit Cookie pattern is a ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
45 views
0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
39 views
0 votes
1 answer

Why do passwords need to be salted?

Salting is a crucial practice in password ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
38 views