Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

how to find hostname using ip address in cmd

To find host name from IP you ...READ MORE

Feb 20, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
91,225 views
0 votes
1 answer

how to find ip address in cmd

1. Open the Command Prompt.   a. Click the Start icon, ...READ MORE

Feb 9, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
47,790 views
0 votes
0 answers

How to configure WAF rules for mitigating RFI attacks?

I’m setting up a Web Application Firewall ...READ MORE

13 hours ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
14 views
0 votes
0 answers

How to script a privilege escalation attack simulation in Linux?

As part of security assessments, I want ...READ MORE

13 hours ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
13 views
0 votes
0 answers

How can you exploit file upload vulnerabilities in PHP apps?

I am studying web security and want ...READ MORE

13 hours ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
12 views
0 votes
0 answers

How do you track failed login attempts using ELK Stack?

I am using the ELK (Elasticsearch, Logstash, ...READ MORE

13 hours ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
10 views
0 votes
0 answers

How to automate a vulnerability assessment lifecycle in Python?

I’m looking to build an automated vulnerability ...READ MORE

13 hours ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
10 views
0 votes
0 answers

How do you detect brute force login attempts in Apache logs?

I need to monitor an Apache web ...READ MORE

13 hours ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
8 views
0 votes
0 answers

How to write a Python script for XSS vulnerability detection?

I am developing a security testing tool ...READ MORE

13 hours ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
6 views
0 votes
0 answers

How to automate vulnerability scanning using OpenVAS?

I want to automate vulnerability scanning using ...READ MORE

13 hours ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
5 views
0 votes
0 answers

How do you detect SQL injection attacks?

Securing our web applications against SQL injection ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
10 views
0 votes
0 answers

How to secure a Linux web server?

I’m tasked with ensuring our Linux-based web ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
8 views
0 votes
0 answers

How to detect open ports on a web server using Python?

I need to perform a security audit ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
8 views
0 votes
0 answers

How to use Burp Suite to analyze a web application attack?

I’m currently learning web application security testing ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
7 views
0 votes
0 answers

How can you automate patch management with PowerShell?

Managing patches across multiple Windows machines manually ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
7 views
0 votes
0 answers

Can apps access other apps RAM on iOS?

I’m currently researching the sandboxing and memory ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
7 views
0 votes
0 answers

What are the defensive measures against session hijacking attacks?

I'm developing a web application where session ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
7 views
0 votes
0 answers

Is Safari a safe browser for iPhone?

As an iPhone user, I'm interested in ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
6 views
0 votes
0 answers

How can we protect against the evil twin?

An Evil Twin attack involves an attacker ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
18 views
0 votes
0 answers

What is the most common vulnerability associated with IoT devices?

There are many security risks with IoT, ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
15 views
0 votes
0 answers

What is the purpose of anti-rollback protection in IoT devices?

I’ve seen anti-rollback protection mentioned in IoT ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
15 views
0 votes
0 answers

What techniques are there for preventing radio-signal replay attacks?

Many IoT devices (RFID, smart locks, etc.) ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
12 views
0 votes
0 answers

What if IoT devices are fabricated with random passwords?

One major IoT security flaw is default ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
12 views
0 votes
0 answers

What are the security risks of hole punching in IoT?

I've heard that NAT hole punching is ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
11 views
0 votes
0 answers

How do so many vulnerable IoT devices stay alive and online?

There are reports of millions of vulnerable ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
10 views
0 votes
0 answers

How do IoT devices know the checksum of firmware upgrades?

When IoT devices update their firmware, they ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
10 views
0 votes
0 answers

Is a router a better device for an IoT botnet than devices within its network?

I've read about IoT botnets and how ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
58 views
0 votes
0 answers

Can static IP addressing prevent IoT botnets?

I’ve read that some IoT botnets rely ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
53 views
0 votes
0 answers

Do I need a Gateway Firewall for an IoT network?

I’m setting up an IoT network and ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
52 views
0 votes
0 answers

How do you secure IoT devices?

With IoT devices being common attack targets, ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
48 views
0 votes
0 answers

Should the local network be checked first to access IoT devices?

I’ve noticed that some IoT devices prioritize ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
46 views
0 votes
0 answers

How do you check whether the password is strong or not?

I want to ensure that passwords meet ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
41 views
0 votes
0 answers

How do I get a list of service accounts in Active Directory?

I need to list all service accounts ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
37 views
0 votes
0 answers

Why trust Nmap's reverse lookup for hostnames during discovery?

During Nmap scans, I see that it ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
34 views
0 votes
0 answers

What are the negative aspects of creating fake security footprints?

I've heard about fake security footprints, where ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
31 views
0 votes
0 answers

What is the difference between active and passive Digital Footprints?

I've been researching digital footprints and found ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
26 views
0 votes
0 answers

How do I find unused service accounts in Active Directory?

Our AD environment contains several service accounts, ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
24 views
0 votes
0 answers

Is WebGL a security concern?

I’ve heard that WebGL (Web Graphics Library) ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
24 views
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
23 views
0 votes
0 answers

Should I allow communication on public networks?

When connecting to a public network (like ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
22 views
0 votes
0 answers

How to exploit LDAP injection?

I'm studying LDAP injection for cybersecurity research ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
21 views
0 votes
0 answers

How to map a network passively with Wireshark dumps?

I want to analyze a network passively ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
21 views
0 votes
0 answers

Should I allow apps to communicate through Windows Firewall?

Windows Firewall often asks whether an application ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
21 views
0 votes
0 answers
0 votes
0 answers

How do I remove a service connection point in Active Directory?

I need to remove a Service Connection ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
20 views
0 votes
0 answers

How do firewalls handle encrypted traffic?

Most modern websites and services use HTTPS ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
20 views
0 votes
0 answers

What is the difference between active and passive digital footprints?

I’ve heard about digital footprints being categorized ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
51 views
0 votes
0 answers

Can a web server be secured with just a firewall?

I know firewalls play a crucial role ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
44 views
0 votes
0 answers

Is there any reason not to salt and hash before using bcrypt?

I’ve seen some recommendations suggesting that you ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
42 views
0 votes
0 answers

What's the point of salting Double Submit Cookie (CSRF protection)?

I came across the concept of salting ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Anupam
• 9,890 points
40 views