Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

How to secure a Linux web server?

Securing a Linux web server involves implementing ...READ MORE

Feb 18, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
543 views
0 votes
1 answer

How can we protect against the evil twin?

An Evil Twin attack involves an attacker ...READ MORE

Feb 17, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
571 views
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
5,836 views
0 votes
1 answer

Should I allow apps to communicate through Windows Firewall?

When Windows Firewall prompts you to allow ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
846 views
0 votes
1 answer

In Veracrypt, which encryption algorithm and hash algorithm should I use?

Choosing the right encryption and hash algorithms ...READ MORE

Dec 3, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
3,786 views
0 votes
1 answer

What if IoT devices are fabricated with random passwords?

Manufacturing IoT devices with unique, random passwords ...READ MORE

Feb 17, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
491 views
0 votes
1 answer

Can static IP addressing prevent IoT botnets?

The use of static versus dynamic IP ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
742 views
0 votes
1 answer

How to scan for ports opened by TCP/UDP sockets with Nmap or any other tool?

To effectively scan a system for open ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
766 views
0 votes
1 answer

Is a router a better device for an IoT botnet than devices within its network?

In the context of IoT botnets, both ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
716 views
0 votes
1 answer

Which is better: SSH RSA or SSH DSS?

When comparing SSH key types, RSA (Rivest–Shamir–Adleman) ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,039 views
0 votes
1 answer

Why trust Nmap's reverse lookup for hostnames during discovery?

Nmap, a widely-used network scanning tool, performs ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
706 views
0 votes
1 answer

How do you check whether the password is strong or not?

Ensuring that passwords meet strong security standards ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
686 views
0 votes
1 answer

Do I need a Gateway Firewall for an IoT network?

Implementing a Gateway Firewall is highly recommended ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
649 views
0 votes
1 answer

Should the local network be checked first to access IoT devices?

Many Internet of Things (IoT) devices are ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
640 views
0 votes
1 answer

Should I allow communication on public networks?

When connecting to public Wi-Fi networks, such ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
631 views
0 votes
1 answer

How do you secure IoT devices?

Securing Internet of Things (IoT) devices is ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
606 views
0 votes
1 answer

Why do passwords need to be salted?

Salting is a crucial practice in password ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
692 views
0 votes
1 answer

Can a web server be secured with just a firewall?

Relying solely on a firewall to secure ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
643 views
0 votes
1 answer

How do firewalls handle encrypted traffic?

Firewalls play a crucial role in network ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
601 views
0 votes
1 answer

Does a digital certificate contain a private key?

Digital certificates are fundamental components of public ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
638 views
0 votes
1 answer

How to map a network passively with Wireshark dumps?

Passive network mapping involves analyzing existing network ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
579 views
0 votes
1 answer

Can I protect against password hacking just by salting the previous-hash?

Enhancing password security is crucial in safeguarding ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
659 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes, such as Lamport ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
631 views
0 votes
1 answer

Why use manual testing for web server attacks if scanners can detect vulnerabilities?

While automated security scanners are valuable tools ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
594 views
0 votes
1 answer

How to check if your phone is under surveillance?

If you think your phone might be ...READ MORE

Nov 25, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
3,874 views
0 votes
1 answer

Why don't digital signatures reveal the sender’s private key?

Digital signatures are a cornerstone of modern ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
607 views
0 votes
1 answer

What are the negative aspects of creating fake security footprints?

Creating fake security footprints, such as misleading ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
542 views
0 votes
1 answer

How is the digital certificate sent alongside digital signatures?

When a digital signature is applied to ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
591 views
0 votes
1 answer

Why do digital signatures need different algorithms?

Digital signatures are essential in modern cryptography ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
535 views
0 votes
1 answer

How to exploit LDAP injection?

LDAP injection is a security vulnerability that ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
451 views
0 votes
1 answer

Any reason I shouldn't be salting and hashing before putting through bCrypt?

When implementing password security with bcrypt, it's ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
552 views
0 votes
1 answer

How secure is the hashing, salting, and stretching process in this diagram?

Evaluating the security of your password hashing, ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
518 views
0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
523 views
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
574 views
0 votes
1 answer

Is salting a hash more secure than encrypting it?

When securing passwords, it's essential to understand ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
479 views
0 votes
1 answer

Would re-salting passwords regularly in-/decrease security?

Regularly re-salting and re-hashing stored passwords—changing the ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
475 views
0 votes
1 answer

Why is Nmap not showing open ports?

When Nmap fails to detect open ports ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,862 views
0 votes
1 answer

How can I check if a private key and certificate match in OpenSSL with ECDSA?

To check if a private key matches ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
3,181 views
0 votes
1 answer

Is Backup a Preventive or Corrective Control?

In security frameworks, controls are categorized into ...READ MORE

Jan 3, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,638 views
0 votes
1 answer

What is the response from an open TCP port which is not behind a firewall?

When you send a TCP SYN packet ...READ MORE

Jan 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,358 views
0 votes
1 answer

Which Nmap scan does not completely open a TCP connection?

In Nmap, the SYN scan (-sS) is ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,306 views
0 votes
1 answer

How do you check if SNMP is working correctly?

Ensuring that Simple Network Management Protocol (SNMP) ...READ MORE

Dec 19, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,064 views
0 votes
1 answer

How can I get a 12-byte authentication tag in AES-GCM?

To generate a 12-byte (96-bit) authentication tag ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,650 views
0 votes
1 answer

Does proxychains-ng have limitations when working with Nmap?

When integrating proxychains-ng with Nmap, several limitations ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,858 views
0 votes
1 answer

Why does Nmap show closed ports?

When Nmap reports a port as closed, ...READ MORE

Jan 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,142 views
0 votes
1 answer

Is true or false the Nmap tool can be used to identify ports on a target system?

True, Nmap is a versatile network scanning ...READ MORE

Jan 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,127 views
0 votes
1 answer

Why is XOR used in cryptography?

The XOR (exclusive OR) operation is fundamental ...READ MORE

Jan 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
840 views
0 votes
1 answer

Does obfuscation provide true encryption and is it very secure?

Obfuscation and encryption are both techniques used ...READ MORE

Jan 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
776 views
0 votes
1 answer

What’s the difference between session hijacking and spoofing?

Session hijacking and spoofing are both cyberattack ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,677 views
0 votes
1 answer

Is renaming folders & files and changing file types an effective solution for file security of a PC?

Renaming files or changing their extensions to ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,042 views