Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

What is the difference between Software Development vs Cybersecurity?

Choosing between software development and cybersecurity is ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
72 views
0 votes
0 answers

Why am I unable to gain a shell on a remote system despite finding a vulnerability?

I’ve found a vulnerability on a remote ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
99 views
0 votes
1 answer

How worth it is the CISSP?

I passed through the process of achieving ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
48 views
0 votes
1 answer

What is a better or more interesting future profession: cybersecurity or software developer/programmer?

When considering the future of cybersecurity versus ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
39 views
0 votes
1 answer

What should be in my resume to get a job in cybersecurity?

If you're thinking of transitioning into a ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
39 views
0 votes
0 answers

Why can't I obtain a user token from a compromised API?

During a penetration testing exercise, I was ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
60 views
0 votes
1 answer

How do I perform a CSRF attack to change user account settings without authorization?

A Cross-Site Request Forgery (CSRF) attack is ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
77 views
0 votes
1 answer

How do I find and exploit an insecure API endpoint in a mobile app?

In order to locate and test insecure ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
77 views
0 votes
1 answer

How do I evade detection while using a VPN during an attack?

Yes, even when we're using a VPN, ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
72 views
0 votes
1 answer

How do I create a custom Metasploit payload that avoids antivirus detection?

If you're trying to create a custom ...READ MORE

Oct 23 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
89 views
0 votes
1 answer

What techniques can I use in Python to analyze logs for potential security breaches?

To analyze logs for potential security breaches, ...READ MORE

Oct 23 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
69 views
0 votes
1 answer

Can a 42-year-old get into cybersecurity without an IT background?

Absolutely, you can break into the Cybersecurity ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
45 views
0 votes
1 answer

Are Cybersecurity and Information Security the same thing?

Cybersecurity and information security are related but ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
39 views
0 votes
1 answer

Can hackers hide their info from netstat?

Yes, attackers can hide their network activity ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
38 views
0 votes
1 answer

How can I utilize Java to build a simple vulnerability scanner for web applications?

In order to build a simple vulnerability ...READ MORE

Oct 23 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
58 views
0 votes
1 answer

Why is my brute-force attack on a web application failing after a few attempts?

If your brute-force attack is failing after ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
35 views
+1 vote
1 answer

What are the best practices for securing HTML forms against XSS attacks?

In order to secure HTML forms against ...READ MORE

Oct 22 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
120 views
+1 vote
1 answer

What methods can I use in JavaScript to detect and prevent clickjacking attacks?

In order to prevent clickjacking attacks, we ...READ MORE

Oct 23 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
92 views
+1 vote
1 answer

How does the LIMIT clause in SQL queries lead to injection attacks?

The LIMIT clause in SQL can indeed ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
199 views
+1 vote
1 answer

How can I conduct reverse DNS lookups efficiently using DNS footprinting methods?

Reverse DNS lookup allow users to map ...READ MORE

Oct 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
105 views
+1 vote
1 answer

What is the role of WHOIS data in DNS footprinting and how can I automate retrieval?

WHOIS data is essential in DNS footprinting ...READ MORE

Oct 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
102 views
0 votes
1 answer

How can I use PHP to securely handle user sessions and prevent session hijacking?

In order to securely handle user sessions ...READ MORE

Oct 23 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
93 views
+1 vote
1 answer
+1 vote
1 answer

Can you show me an example of using DNS dig commands in a Python script?

You can run shell commands like dig ...READ MORE

Oct 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
92 views
0 votes
1 answer
0 votes
0 answers

How do I start learning cybersecurity?

I’ve recently developed an interest in cybersecurity ...READ MORE

Oct 21 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
34 views
+1 vote
1 answer

What is the best way to use APIs for DNS footprinting in Node.js?

There are several APIs that can help ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
121 views
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
97 views
+1 vote
1 answer

How can I use Python for web scraping to gather information during reconnaissance?

Python is considered to be an excellent ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
89 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
83 views
0 votes
0 answers

What is the role of DNSSEC in footprinting, and how can I query it programmatically?

I’m currently working on a DNS footprinting ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
138 views
0 votes
0 answers

How do I write a simple PERL script to scan for open ports on a target machine?

I’m learning about network security and I ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
89 views
0 votes
0 answers

How can I use JavaScript to create a basic keylogger for ethical hacking purposes?

I’m exploring ethical hacking techniques and I’ve ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
80 views
0 votes
0 answers

How can I implement basic input validation in Java to prevent common web vulnerabilities?

I’m working on a Java web application, ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
74 views
0 votes
0 answers

How do I use Python's subprocess to run multiple DNS queries in parallel?

I’m working on a Python script that ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
63 views
0 votes
0 answers

How can PHP be used to create a secure web application to prevent SQL injection?

I’m developing a web application using PHP, ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
61 views
0 votes
0 answers

Why can't I obtain user token from a compromised API?

Why can't I obtain user token from ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
151 views
0 votes
0 answers

Why is my brute-force attack on a web application failing after a few attempts?

Why is my brute-force attack on a ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
96 views
0 votes
0 answers

what can the skills developed by cybersecurity professionals be used for?

what can the skills developed by cybersecurity ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
93 views
0 votes
0 answers

What should be in my resume to get a job in cyber security?

What should be in my resume to ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
79 views
0 votes
0 answers

Are cyber security and information security the same thing?

Are cyber security and information security the ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
79 views
0 votes
0 answers
0 votes
0 answers

Can hackers hide their info from netstat?

Can hackers hide their info from netstat? READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
72 views
0 votes
0 answers

How do I find and exploit an insecure API endpoint in a mobile app?

How do I find and exploit an ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
59 views
0 votes
0 answers

How do I evade detection while using a VPN during an attack?

How do I evade detection while using ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
58 views
0 votes
0 answers
0 votes
0 answers