Trending questions in Cyber Security & Ethical Hacking

0 votes
0 answers

How to secure cookie attributes against session hijacking?

I am working on securing user sessions ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
41 views
0 votes
0 answers

How is data transmission done in the OSI model?

I want to understand how data moves ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
35 views
0 votes
0 answers

How to automate malware scanning on a web server using ClamAV?

I want to automatically scan my web ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
33 views
0 votes
0 answers

How can a CSRF vulnerability be exploited in an insecure app?

I am testing a web application for ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 14,060 points
69 views
0 votes
1 answer

How do you detect log tampering in a compromised system?

Ensuring the integrity of system logs is ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
157 views
0 votes
1 answer

How can DNS poisoning be used to compromise web applications?

DNS poisoning, also known as DNS spoofing ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points

edited Mar 6 112 views
0 votes
1 answer

How to run a scan equivalent to nmap vulnerabilities scan?

Nmap is a versatile network scanning tool ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
110 views
0 votes
1 answer

How does an attacker escalate privileges via SUID misconfigurations?

In Unix-like operating systems, the Set User ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
110 views
0 votes
1 answer

How to exploit LFI to retrieve sensitive files in NGINX?

Local File Inclusion (LFI) vulnerabilities occur when ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
109 views
0 votes
1 answer

How do I ignore hidden files in Linux?

In Linux, hidden files and directories are ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
104 views
0 votes
1 answer

How to analyze malicious web shell uploads in a web server?

Analyzing potential web shell uploads on a ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
98 views
0 votes
1 answer

How to write a script to check for insecure HTTP headers?

Ensuring the security of your web application ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
95 views
0 votes
1 answer

How to use Metasploit to exploit unpatched web applications?

Metasploit is a powerful framework used in ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
90 views
0 votes
1 answer

How does an attacker bypass CSP (Content Security Policy)?

Content Security Policy (CSP) is a critical ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
89 views
0 votes
1 answer

How can malware be hidden using NTFS Alternate Data Streams?

NTFS Alternate Data Streams (ADS) are a ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
86 views
0 votes
1 answer

How do you automate vulnerability scoring in the CVSS system?

Automating vulnerability scoring using the Common Vulnerability ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
80 views
0 votes
1 answer

How to automate patching web server vulnerabilities with Ansible?

Automating the patching of web server vulnerabilities ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
79 views
0 votes
1 answer

How to configure OWASP ZAP for automated vulnerability scans?

Configuring OWASP Zed Attack Proxy (ZAP) for ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
60 views
0 votes
1 answer

How do you parse Apache access logs?

Parsing Apache access logs is essential for ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
53 views
0 votes
1 answer

How to prevent password cracking using salting and hashing?

To safeguard passwords against brute-force and dictionary ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
49 views
0 votes
1 answer

How to script a privilege escalation attack simulation in Linux?

Simulating a privilege escalation attack in Linux ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
123 views
0 votes
1 answer

How to automate a vulnerability assessment lifecycle in Python?

Automating a vulnerability assessment lifecycle using Python ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
120 views
0 votes
1 answer

How to automate vulnerability scanning using OpenVAS?

Automating vulnerability scanning with OpenVAS enhances your ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
98 views
0 votes
1 answer

How to write a Python script for XSS vulnerability detection?

Detecting Cross-Site Scripting (XSS) vulnerabilities is crucial ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
94 views
0 votes
1 answer

How do you track failed login attempts using ELK Stack?

Monitoring failed login attempts is crucial for ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
88 views
0 votes
1 answer

How to configure WAF rules for mitigating RFI attacks?

Mitigating Remote File Inclusion (RFI) attacks is ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
77 views
0 votes
1 answer

How can you exploit file upload vulnerabilities in PHP apps?

File upload vulnerabilities in PHP applications pose ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
74 views
0 votes
1 answer

How do you detect brute force login attempts in Apache logs?

Monitoring Apache web server logs is essential ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
66 views
0 votes
1 answer

How to secure a Linux web server?

Securing a Linux web server involves implementing ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
110 views
0 votes
1 answer

How to detect open ports on a web server using Python?

Conducting a security audit to identify open ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
110 views
0 votes
1 answer

How do you detect SQL injection attacks?

Detecting SQL injection (SQLi) attacks is crucial ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
106 views
0 votes
1 answer

What is the purpose of anti-rollback protection in IoT devices?

Anti-rollback protection is a security feature in ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
144 views
0 votes
1 answer

How to use Burp Suite to analyze a web application attack?

Burp Suite is a comprehensive platform for ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
71 views
0 votes
1 answer

How can we protect against the evil twin?

An Evil Twin attack involves an attacker ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
112 views
0 votes
1 answer

What are the defensive measures against session hijacking attacks?

Session hijacking is a critical security concern ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
69 views
0 votes
1 answer

What is the most common vulnerability associated with IoT devices?

The Internet of Things (IoT) has revolutionized ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
111 views
0 votes
1 answer

Can apps access other apps RAM on iOS?

iOS enforces strict memory isolation between applications ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
57 views
0 votes
1 answer

How can you automate patch management with PowerShell?

Automating patch management across multiple Windows machines ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
56 views
0 votes
1 answer

Is Safari a safe browser for iPhone?

Safari on iPhone is designed with a ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
52 views
0 votes
1 answer

How do IoT devices know the checksum of firmware upgrades?

When Internet of Things (IoT) devices perform ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
80 views
0 votes
1 answer

What are the security risks of hole punching in IoT?

NAT (Network Address Translation) hole punching is ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
65 views
0 votes
1 answer

How do so many vulnerable IoT devices stay alive and online?

The persistence of vulnerable Internet of Things ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
62 views
0 votes
1 answer

What techniques are there for preventing radio-signal replay attacks?

Replay attacks pose significant security threats to ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
61 views
0 votes
1 answer

What if IoT devices are fabricated with random passwords?

Manufacturing IoT devices with unique, random passwords ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
57 views
0 votes
1 answer

Is a router a better device for an IoT botnet than devices within its network?

In the context of IoT botnets, both ...READ MORE

Feb 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
145 views
0 votes
1 answer

What is the difference between active and passive digital footprints?

A digital footprint refers to the trail ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
201 views
0 votes
1 answer

Do I need a Gateway Firewall for an IoT network?

Implementing a Gateway Firewall is highly recommended ...READ MORE

Feb 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
140 views
0 votes
1 answer

Should the local network be checked first to access IoT devices?

Many Internet of Things (IoT) devices are ...READ MORE

Feb 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
131 views
0 votes
1 answer

Can static IP addressing prevent IoT botnets?

The use of static versus dynamic IP ...READ MORE

Feb 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
129 views
0 votes
1 answer

How do I get a list of service accounts in Active Directory?

To list all service accounts in your ...READ MORE

Feb 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 24,620 points
128 views