Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

how to find hostname using ip address in cmd

To find host name from IP you ...READ MORE

Feb 20, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
91,361 views
0 votes
0 answers

How to automate patching web server vulnerabilities with Ansible?

I manage multiple web servers and want ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 8,520 points
17 views
0 votes
0 answers

How do you detect log tampering in a compromised system?

After a security incident, I want to ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 8,520 points
16 views
0 votes
0 answers

How can DNS poisoning be used to compromise web applications?

I am studying network security and want ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 8,520 points
16 views
0 votes
0 answers

How does an attacker bypass CSP (Content Security Policy)?

I am researching web security and want ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 8,520 points
15 views
0 votes
0 answers

How to exploit LFI to retrieve sensitive files in NGINX?

I am studying Local File Inclusion (LFI) ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
15 views
0 votes
0 answers

How do I ignore hidden files in Linux?

When working with Linux commands like ls, ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 8,520 points
12 views
0 votes
0 answers

How does an attacker escalate privileges via SUID misconfigurations?

I am studying privilege escalation techniques on ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
11 views
0 votes
0 answers

How do you parse Apache access logs?

I need to extract useful information from ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 8,520 points
9 views
0 votes
0 answers

How to run a scan equivalent to nmap vulnerabilities scan?

I use Nmap for network reconnaissance but ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
9 views
0 votes
0 answers

How to configure OWASP ZAP for automated vulnerability scans?

I am setting up OWASP ZAP to ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
9 views
0 votes
0 answers

How to write a script to check for insecure HTTP headers?

I want to analyze a website’s HTTP ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
8 views
0 votes
0 answers

How can malware be hidden using NTFS Alternate Data Streams?

I am researching Windows security and came ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
7 views
0 votes
0 answers

How to analyze malicious web shell uploads in a web server?

I am investigating a potential web shell ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
7 views
0 votes
0 answers

How do you automate vulnerability scoring in the CVSS system?

I am working on a security assessment ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
7 views
0 votes
0 answers

How to prevent password cracking using salting and hashing?

I am implementing a password storage system ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
7 views
0 votes
0 answers

How to use Metasploit to exploit unpatched web applications?

I am learning penetration testing and want ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
4 views
0 votes
1 answer

how to find ip address in cmd

1. Open the Command Prompt.   a. Click the Start icon, ...READ MORE

Feb 9, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
47,795 views
0 votes
0 answers

How to script a privilege escalation attack simulation in Linux?

As part of security assessments, I want ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
32 views
0 votes
0 answers

How can you exploit file upload vulnerabilities in PHP apps?

I am studying web security and want ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
29 views
0 votes
0 answers

How to configure WAF rules for mitigating RFI attacks?

I’m setting up a Web Application Firewall ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
27 views
0 votes
0 answers

How to automate a vulnerability assessment lifecycle in Python?

I’m looking to build an automated vulnerability ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
26 views
0 votes
0 answers

How to write a Python script for XSS vulnerability detection?

I am developing a security testing tool ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
19 views
0 votes
0 answers

How do you track failed login attempts using ELK Stack?

I am using the ELK (Elasticsearch, Logstash, ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
17 views
0 votes
0 answers

How to automate vulnerability scanning using OpenVAS?

I want to automate vulnerability scanning using ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
15 views
0 votes
0 answers

How do you detect brute force login attempts in Apache logs?

I need to monitor an Apache web ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
15 views
0 votes
0 answers

How do you detect SQL injection attacks?

Securing our web applications against SQL injection ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
23 views
0 votes
0 answers

How to secure a Linux web server?

I’m tasked with ensuring our Linux-based web ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
21 views
0 votes
0 answers

How to detect open ports on a web server using Python?

I need to perform a security audit ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
19 views
0 votes
0 answers

What are the defensive measures against session hijacking attacks?

I'm developing a web application where session ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
18 views
0 votes
0 answers

How to use Burp Suite to analyze a web application attack?

I’m currently learning web application security testing ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
17 views
0 votes
0 answers

How can you automate patch management with PowerShell?

Managing patches across multiple Windows machines manually ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
16 views
0 votes
0 answers

Is Safari a safe browser for iPhone?

As an iPhone user, I'm interested in ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
16 views
0 votes
0 answers

Can apps access other apps RAM on iOS?

I’m currently researching the sandboxing and memory ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
15 views
0 votes
0 answers

How can we protect against the evil twin?

An Evil Twin attack involves an attacker ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
30 views
0 votes
0 answers

What is the most common vulnerability associated with IoT devices?

There are many security risks with IoT, ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
27 views
0 votes
0 answers

What is the purpose of anti-rollback protection in IoT devices?

I’ve seen anti-rollback protection mentioned in IoT ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
25 views
0 votes
0 answers

What techniques are there for preventing radio-signal replay attacks?

Many IoT devices (RFID, smart locks, etc.) ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
19 views
0 votes
0 answers

What if IoT devices are fabricated with random passwords?

One major IoT security flaw is default ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
18 views
0 votes
0 answers

What are the security risks of hole punching in IoT?

I've heard that NAT hole punching is ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
17 views
0 votes
0 answers

How do so many vulnerable IoT devices stay alive and online?

There are reports of millions of vulnerable ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
16 views
0 votes
0 answers

How do IoT devices know the checksum of firmware upgrades?

When IoT devices update their firmware, they ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
16 views
0 votes
1 answer

What is the difference between active and passive digital footprints?

A digital footprint refers to the trail ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
66 views
0 votes
1 answer

How to map a network passively with Wireshark dumps?

Passive network mapping involves analyzing existing network ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
32 views
0 votes
1 answer

Should I allow apps to communicate through Windows Firewall?

When Windows Firewall prompts you to allow ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
32 views
0 votes
1 answer

How to scan for ports opened by TCP/UDP sockets with Nmap or any other tool?

To effectively scan a system for open ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
31 views
0 votes
1 answer

Should I allow communication on public networks?

When connecting to public Wi-Fi networks, such ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
29 views
0 votes
1 answer

Why trust Nmap's reverse lookup for hostnames during discovery?

Nmap, a widely-used network scanning tool, performs ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
45 views
0 votes
1 answer

How do firewalls handle encrypted traffic?

Firewalls play a crucial role in network ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
27 views
0 votes
1 answer

How do I remove a service connection point in Active Directory?

Removing a Service Connection Point (SCP) from ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
26 views