Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

how to find hostname using ip address in cmd

To find host name from IP you ...READ MORE

Feb 20, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
92,903 views
0 votes
1 answer

how to find ip address in cmd

if you are using windows then there ...READ MORE

Feb 26, 2023 in Cyber Security & Ethical Hacking by subhasish

edited Mar 5 47,924 views
0 votes
1 answer

How would a professional hacker penetrate a computer in a network?

​Penetration testing, often referred to as ethical ...READ MORE

6 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
12 views
0 votes
1 answer

How do hackers and security researchers scan the internet for vulnerable servers and devices?

Hackers and security researchers employ various tools ...READ MORE

5 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
11 views
0 votes
1 answer

How does Nmap detect hosts in a network with stealth scans?

​Nmap employs various stealth scanning techniques to ...READ MORE

5 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
10 views
0 votes
1 answer

How can the Nmap tool be used to evade a firewall/IDS?

​Nmap offers several techniques to help evade ...READ MORE

5 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
9 views
0 votes
1 answer

How does BeEF do a portscan and ping?

​The Browser Exploitation Framework (BeEF) is renowned ...READ MORE

6 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
8 views
0 votes
1 answer

How to secure my network and system setup?

Securing your network and system setup is ...READ MORE

6 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
4 views
0 votes
1 answer

How to bypass tcpwrapped with Nmap scan?

​When conducting network scans with Nmap, encountering ...READ MORE

9 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
9 views
0 votes
1 answer

What are the best practices to avoid my server being port scanned?

​Port scanning is a technique used by ...READ MORE

9 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
6 views
0 votes
1 answer

How do you prevent hackers from taking a "publicly used API key" and using it in their own script?

​Exposing API keys in public projects can ...READ MORE

9 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
6 views
0 votes
1 answer

Does port knocking increase security behind a router?

​Port knocking is a security technique that ...READ MORE

8 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
4 views
0 votes
1 answer

How sensitive is information on a system's architecture?

​Exposing details about your system's architecture can ...READ MORE

9 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
4 views
0 votes
1 answer

How to protect against backdoors in routers?

Protecting your router from backdoors is crucial ...READ MORE

9 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
4 views
0 votes
1 answer

Is there any alternative to Nmap for UDP?

​While Nmap is a widely used tool ...READ MORE

9 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
4 views
0 votes
1 answer

Is a "single" CPU safer than multiple cores?

​The number of CPU cores in a ...READ MORE

9 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
4 views
0 votes
1 answer

Can a VirtualBox VM prevent malware infection in my case?

​VirtualBox virtual machines (VMs) are commonly employed ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
28 views
0 votes
1 answer

What’s the safest way to store 2FA/MFA secret keys in a database?

​Storing Two-Factor Authentication (2FA) or Multi-Factor Authentication ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
23 views
0 votes
1 answer

What are the security pros and cons of setting up passkeys for Gmail logins?

​Passkeys are an emerging authentication method designed ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
19 views
0 votes
0 answers

How to scan for ports opened by TCP/UDP sockets with Nmap or any other tool?

Open TCP/UDP sockets indicate active services. What ...READ MORE

6 hours ago in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
8 views
0 votes
1 answer

Why are some Cloudflare challenges CPU-intensive?

​Cloudflare employs CPU-intensive challenges as a security ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
16 views
0 votes
1 answer

What prevents random software installation popups from misinterpreting our consent?

​Operating systems and security measures employ several ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
15 views
0 votes
0 answers

How to conclude from a target IP to associated URL(s)?

Given an IP address, it’s sometimes possible ...READ MORE

6 hours ago in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
4 views
0 votes
1 answer

What’s the reasoning behind blocking specific ports like 10080 on internet browsers?

​Browsers block specific ports, such as 10080, ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
11 views
0 votes
1 answer

How long does malware last "in the wild"?

​The duration for which malware remains active ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
10 views
0 votes
1 answer

How can I safely buy a USB memory stick?

​When purchasing a USB memory stick, it's ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
9 views
0 votes
1 answer

How to deal with monitoring software on a personal PC used for work?

​Employers implementing monitoring software on personal devices ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
21 views
0 votes
1 answer

What sense does it make to use a Vault?

​Secure vaults are specialized storage solutions designed ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
20 views
0 votes
1 answer

What is a secure way to store the master password of a password manager?

A password manager enhances security by storing ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
20 views
0 votes
1 answer

How is a passkey more secure than the regular email/password with a U2F key?

​Passkeys represent a significant advancement in authentication ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
18 views
0 votes
1 answer

How does an "enterprise browser" work?

​Enterprise browsers are specialized web browsers designed ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
17 views
0 votes
1 answer

How to sniff Bluetooth traffic and determine encryption on fitness tracker data?

​Analyzing Bluetooth traffic from fitness trackers can ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
15 views
0 votes
1 answer

What techniques are there for preventing radio-signal replay attacks?

​Replay attacks in wireless communications occur when ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
14 views
0 votes
1 answer

What is a secure way to store the master password of a password manager?

Ensuring the security of your password manager's ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
33 views
0 votes
1 answer

How can I ensure that sensitive data on a Windows computer is not transmitted externally by any software?

​Preventing unauthorized transmission of sensitive data from ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
25 views
0 votes
1 answer

How should I report a Man-in-the-Middle attack in my workplace?

​A Man-in-the-Middle (MITM) attack involves an unauthorized ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
19 views
0 votes
1 answer

Is loss of availability automatically a security incident?

​Availability is a fundamental principle of cybersecurity, ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
19 views
0 votes
1 answer

How to receive large files guaranteeing authenticity, integrity, and sending time?

Ensuring the authenticity, integrity, and accurate timing ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
16 views
0 votes
0 answers

Can my IP be found on Telegram by malicious people?

Telegram offers various privacy protections, but is ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
11 views
0 votes
1 answer

How are all public computers (libraries, etc.) not full of malware?

​Public computers in libraries, schools, and other ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
13 views
0 votes
0 answers

How to do bug bounty hunting?

Bug bounty programs reward security researchers for ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
22 views
0 votes
0 answers

How can you trust a forensic scientist to have maintained the chain of custody?

Maintaining the chain of custody is essential ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
19 views
0 votes
1 answer

How does ransomware store its decryption keys?

​Ransomware operates by encrypting a victim's files ...READ MORE

Mar 28 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
70 views
0 votes
1 answer

How do you ensure Active Directory data privacy in an organization?

​Active Directory (AD) is a central component ...READ MORE

Mar 28 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
70 views
0 votes
1 answer

How do you configure Active Directory for compliance with GDPR?

To configure Active Directory (AD) for compliance ...READ MORE

Mar 28 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
65 views
0 votes
1 answer

Does a Risk Management approach work in Cybersecurity?

A risk management approach is fundamental to ...READ MORE

Mar 28 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
56 views
0 votes
1 answer

Is sending PHI via email a HIPAA violation?

​Emailing Protected Health Information (PHI) can be ...READ MORE

Mar 28 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
38 views
0 votes
1 answer

Does HIPAA require database encryption?

​The Health Insurance Portability and Accountability Act ...READ MORE

Mar 28 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
35 views
0 votes
1 answer

What are the PCI DSS requirements for SSL/TLS certificates?

​The Payment Card Industry Data Security Standard ...READ MORE

Mar 27 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
65 views
0 votes
1 answer

Is encryption in transit distinct from end-to-end encryption?

​Encryption in transit and end-to-end encryption (E2EE) ...READ MORE

Mar 27 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
57 views