Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

How should a midsized startup approach information security and compliance?

Establishing a robust information security and compliance ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
203 views
0 votes
0 answers

How to prevent lookalike domain phishing and secure client-side code against replication?

We’re concerned about phishing attacks using lookalike ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,800 points
190 views
0 votes
0 answers

What is the threat model for mobile security when the attacker has root access?

When an attacker gains root access to ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,800 points
188 views
0 votes
0 answers

What’s the purpose of the secret in express-session? How does it mitigate threats?

I’ve noticed that the express-session library requires ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,800 points
187 views
0 votes
1 answer

What is the difference between authenticity and non-repudiation?

Authenticity and non-repudiation are fundamental concepts in ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
336 views
0 votes
0 answers

How to prevent CSP bypass and resource access from internal servers via code injection?

Our web application implements a Content Security ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,800 points
177 views
0 votes
1 answer

Why would full disk encryption miss slack space, swap files, and memory?

Full Disk Encryption (FDE) is designed to ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
180 views
0 votes
0 answers

How can I safely analyze a USB device?

I’ve come across a suspicious USB device ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,800 points
177 views
0 votes
0 answers

How to regain SSH access without alerting a threat actor?

Our server may have been compromised, and ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,800 points
153 views
0 votes
1 answer

What steps should be taken to prevent session hijacking in Tomcat?

Session hijacking is a security threat where ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
387 views
0 votes
1 answer

How does HMAC relate to non-repudiation?

You're correct in observing that HMAC (Hash-Based ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
305 views
+1 vote
1 answer

How to get a WiFi password using CMD?

Yes, there's a way to retrieve the ...READ MORE

Nov 7, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,414 views
0 votes
1 answer

Why would a replay attack be considered a threat to integrity and not confidentiality?

A replay attack involves an attacker intercepting ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
342 views
0 votes
1 answer

What is the difference between certificates with extension fields and Non-Repudiation usage?

Digital certificates, particularly X.509 v3 certificates, utilize ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
282 views
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer

What’s the difference between auditing, accounting, logging, and accountability?

In the context of security and monitoring, ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
351 views
0 votes
1 answer

Is it possible to get the user groups or other attributes with TACACS authentication?

Yes, the TACACS+ (Terminal Access Controller Access-Control ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
319 views
0 votes
1 answer

What is a 2FA attestation object for non-repudiation?

In the context of two-factor authentication (2FA), ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
234 views
0 votes
1 answer

How is authentication related to the CIA triad?

Authentication is a fundamental component of the ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
250 views
0 votes
1 answer

Can information security risks essentially only be triaged according to the CIA triangle?

While the CIA triad—Confidentiality, Integrity, and Availability—provides ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
247 views
0 votes
1 answer

How to achieve non-repudiation?

Non-repudiation ensures that a party cannot deny ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
202 views
0 votes
1 answer

What is the overarching term for authentication and authorization?

The overarching term that encompasses both authentication ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
244 views
0 votes
1 answer

Is DRM considered Confidentiality, Integrity, Availability, or a combination of the three?

Digital Rights Management (DRM) systems are designed ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
238 views
0 votes
1 answer

What is non-repudiation that can never be proven?

The term non-repudiation that can never be ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
195 views
0 votes
1 answer

Why define CIA in security like this?

The CIA triad, Confidentiality, Integrity, and Availability, serves as ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
236 views
0 votes
1 answer

Who is the creator of the CIA triad?

The CIA triad, representing Confidentiality, Integrity, and ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
221 views
0 votes
1 answer

Does proxychains-ng have limitations when working with Nmap?

When integrating proxychains-ng with Nmap, several limitations ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
346 views
0 votes
1 answer

What are the best methods to prevent session hijacking?

Preventing session hijacking requires a comprehensive approach ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
252 views
0 votes
1 answer

How do you check if SNMP is working correctly?

Ensuring that Simple Network Management Protocol (SNMP) ...READ MORE

Dec 19, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
509 views
0 votes
1 answer

Are there any solutions available that conform to the AAA protocol?

Yes, there are several solutions that conform ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
235 views
0 votes
1 answer

How to satisfy requirement 10.6 of PCI DSS?

To comply with PCI DSS Requirement 10.6, ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
191 views
0 votes
1 answer

Does HTTPS protect against session hijacking, or are additional measures needed?

While HTTPS encrypts data transmitted between a user's browser ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
199 views
0 votes
1 answer

Using RADIUS for host authentication?

Remote Authentication Dial-In User Service (RADIUS) is ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
198 views
0 votes
1 answer

How effective is HTTPS at protecting users from hacking attempts?

HTTPS (HyperText Transfer Protocol Secure) is a ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
185 views
0 votes
1 answer

How to turn off the camera light on a laptop?

Here are general steps and specific instructions ...READ MORE

Nov 28, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,343 views
0 votes
1 answer

Is using a network sniffer viable for host discovery, or are there better options?

Both network sniffers (e.g., Wireshark) and active ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
256 views
0 votes
1 answer

At which OSI layer does NetBIOS operate, and why is this important?

NetBIOS (Network Basic Input/Output System) primarily operates ...READ MORE

Dec 20, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
383 views
0 votes
1 answer

What methods are available to prevent host discovery on a network?

Preventing host discovery on a network is ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
240 views
0 votes
1 answer

What is BlueBorne, and what steps can users take to protect against it?

BlueBorne is a set of vulnerabilities discovered ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
237 views
0 votes
1 answer

What could cause Nmap host discovery not to show all hosts?

Nmap's host discovery may yield incomplete results ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
237 views
0 votes
1 answer

Why does NMAP host discovery give different results between NAT and Bridged modes?

The discrepancies in Nmap host discovery results ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
228 views
0 votes
1 answer

Is there a way to gauge password strength without knowing the actual password?

Assessing password strength without direct access to ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
218 views
0 votes
1 answer

Which command-line tools are recommended for SNMP enumeration?

Effective SNMP enumeration is essential for network ...READ MORE

Dec 19, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
345 views
0 votes
1 answer

What port does NetBIOS use, and why is it critical for security?

NetBIOS (Network Basic Input/Output System) utilizes specific ...READ MORE

Dec 20, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
297 views
0 votes
1 answer

What port number is assigned to SNMP, and why is it significant?

Simple Network Management Protocol (SNMP) utilizes specific ...READ MORE

Dec 19, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
335 views
0 votes
1 answer

What protocol should be used for NetBIOS enumeration?

NetBIOS enumeration involves gathering information about networked ...READ MORE

Dec 20, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
258 views
0 votes
1 answer

Which protocol does SNMP operate over, and what are its benefits?

Simple Network Management Protocol (SNMP) primarily operates ...READ MORE

Dec 20, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
245 views
0 votes
1 answer

What are effective countermeasures for SNMP enumeration attacks?

Protecting against SNMP enumeration attacks is vital ...READ MORE

Dec 19, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
284 views
0 votes
1 answer

In Veracrypt, which encryption algorithm and hash algorithm should I use?

Choosing the right encryption and hash algorithms ...READ MORE

Dec 3, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
960 views