Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

How can developers implement secure file handling to prevent file-based attacks?

In order to securely handle files and ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
64 views
0 votes
1 answer

What techniques can be used to sanitize image uploads and prevent malicious payloads?

In order to securely handle image uploads ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
61 views
0 votes
1 answer

How to invalidate a JWT token?

To invalidate a JWT token effectively, here ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
40 views
0 votes
1 answer

How to get a WiFi password using CMD?

Yes, there's a way to retrieve the ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
37 views
0 votes
1 answer

How to send a bearer token in a header?

To send a bearer token in an ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
34 views
0 votes
1 answer

How to encrypt an SD card without the original device?

Yes, you can encrypt an SD card ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
31 views
0 votes
1 answer

How to lock a pen drive with a password on a mobile device?

In order to password-protect a USB (pen) ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
28 views
0 votes
1 answer

How to make a unique ID?

To create unique IDs, you can use ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
27 views
0 votes
1 answer

How to create a proxy server?

To set up a basic proxy server, ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
28 views
0 votes
1 answer

How to find subdomains of a domain?

To enumerate subdomains of a domain, there ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
25 views
0 votes
1 answer

How to store passwords in a database?

To securely store passwords in a database, ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
23 views
0 votes
1 answer

How to exploit open ports?

Exploiting open ports is a common attack ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
21 views
0 votes
1 answer
0 votes
1 answer

What methods can I use in JavaScript to detect and prevent clickjacking attacks?

In order to protect our application against ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
37 views
0 votes
1 answer
0 votes
1 answer
0 votes
1 answer

What coding methods can prevent steganography attacks within image files?

To prevent or detect steganography attacks within ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
27 views
0 votes
1 answer
0 votes
1 answer
0 votes
1 answer

What methods can be employed to scan uploaded files for malware before processing?

In order to effectively scan uploaded files ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
24 views
0 votes
1 answer

How can developers detect and block image-based malware in their applications?

To detect and block image-based malware in ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
23 views
0 votes
1 answer

What coding practices can help detect unauthorized removable devices connected to a system?

In order to detect unauthorized removable devices ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
19 views
0 votes
0 answers

How do I identify available NFS shares on a remote server?

I’m trying to enumerate Network File System ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
33 views
0 votes
0 answers

What tools can I use to enumerate time servers and check for misconfigurations?

I want to identify and evaluate time ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
29 views
0 votes
0 answers

How do I use Metasploit to perform NetBIOS enumeration on a target?

I’d like to use Metasploit to perform ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
29 views
0 votes
0 answers

What LDAP query can be used to enumerate all users in a directory?

I’m trying to list all users within ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
27 views
0 votes
0 answers

How can I enumerate valid email addresses using SMTP enumeration techniques?

For a security audit, I’m trying to ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
26 views
0 votes
0 answers

How do I use tools like ldapsearch for LDAP enumeration?

I’ve been advised to use ldapsearch for ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
26 views
0 votes
0 answers

How can I perform LDAP enumeration to extract user account information?

I want to use LDAP enumeration to ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
25 views
0 votes
0 answers

How can I enumerate NTP servers and their configurations using command-line tools?

I want to gather information on Network ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
24 views
0 votes
0 answers

How can message-based phishing attacks be detected programmatically?

I’m exploring ways to detect phishing attacks ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
26 views
0 votes
0 answers

How can I extract sensitive information from SNMP-enabled devices?

I’m interested in understanding how to retrieve ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
23 views
0 votes
0 answers

How can I enumerate SNMP information using tools like snmpwalk?

I need to gather SNMP information for ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,890 points
20 views
0 votes
1 answer
0 votes
1 answer

How to prevent Client-Side XSS in JavaScript?

To prevent client-side XSS attacks in your ...READ MORE

Nov 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
89 views
0 votes
1 answer

How to prevent brute force attacks using Node and Express.js?

To prevent brute-force attacks in a Node ...READ MORE

Nov 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
88 views
0 votes
1 answer

What C or C++ libraries can help in developing custom security tools for ethical hacking?

Here are some C/C++ libraries commonly used ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
64 views
0 votes
1 answer

What tools can I build in Ruby to automate penetration testing tasks?

Ruby is a versatile language that is ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
66 views
0 votes
1 answer
0 votes
1 answer

Is there a SHA that’s guaranteed to produce a unique hash?

No cryptographic hash function, including SHA, can ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
52 views
0 votes
1 answer

How to encrypt data that needs to be decrypted in Node.js?

To securely encrypt and decrypt data in ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
52 views
0 votes
1 answer

What SQL queries can be used to test for SQL injection vulnerabilities in a database?

When testing for SQL injection vulnerabilities, you ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
48 views
0 votes
1 answer

What’s the best way to prevent clickjacking attacks on an Express.js-based web application?

To prevent clickjacking attacks on your Express.js ...READ MORE

Nov 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
56 views
0 votes
1 answer

What can the skills developed by cybersecurity professionals be used for?

Cybersecurity skills have a broad range of ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 3,320 points
229 views