Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

how to find host name from IP with out login to the host

To find host name from IP you ...READ MORE

Feb 20, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
88,301 views
0 votes
1 answer

how to find ip address in cmd

1. Open the Command Prompt.   a. Click the Start icon, ...READ MORE

Feb 9, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
47,598 views
0 votes
0 answers
0 votes
0 answers

Which CompTIA certification is best to start with?

There are many certifications and popular ones, ...READ MORE

21 hours ago in Cyber Security & Ethical Hacking by Ashutosh
• 7,870 points
10 views
0 votes
0 answers

Is CompTIA PenTest+ a better certification than CEH for cybersecurity professionals?

With the help of a proper explanation ...READ MORE

21 hours ago in Cyber Security & Ethical Hacking by Ashutosh
• 7,870 points
9 views
0 votes
0 answers

Should I pursue CySA+ or PenTest+ after obtaining Security+?

Hey, I have recently started my cyber-security ...READ MORE

21 hours ago in Cyber Security & Ethical Hacking by Ashutosh
• 7,870 points
7 views
0 votes
0 answers

How challenging is the CompTIA PenTest+ exam?

With the help of an example, can ...READ MORE

21 hours ago in Cyber Security & Ethical Hacking by Ashutosh
• 7,870 points
7 views
0 votes
0 answers

If users are allowed to export data, what security measures should be in place?

What technical and administrative safeguards, such as ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
7 views
0 votes
0 answers

What distinguishes Cyber Security from IT Security?

How do the scopes of Cyber Security ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
5 views
0 votes
0 answers

How does Information Security relate to Quality Control when it comes to data integrity?

In what ways do Information Security practices, ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
5 views
0 votes
0 answers

What competencies should an Information Security Office have in managing financial risks?

What specific skills, such as risk assessment, ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
5 views
0 votes
0 answers

Are security controls like cryptographic keys considered assets?

How are cryptographic keys categorized in asset ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
5 views
0 votes
0 answers

How do data leakage analysis and vulnerability analysis differ, and how are they related?

What are the primary objectives and methodologies ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
16 views
0 votes
0 answers

Why is SQL injection still a threat after 17 years?

Despite being a well-documented and preventable vulnerability, ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
15 views
0 votes
0 answers

What’s the difference between an Information Security Policy and an Information Security Plan?

How do these documents differ in purpose ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
15 views
0 votes
0 answers

How can organizations implement data classification and data leak prevention effectively?

What steps can businesses take to classify ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
14 views
0 votes
0 answers

What are effective security controls for protecting data in motion?

What are the most effective security measures, ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
13 views
0 votes
0 answers

Are vulnerabilities in transitive dependencies exploitable?

If a transitive dependency in my application ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
22 views
0 votes
0 answers

Is unauthenticated access to electricity meter readings a vulnerability?

If an electricity meter’s readings can be ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
17 views
0 votes
0 answers

What steps can be taken to prevent directory enumeration attacks (e.g., DirB or Directory Buster)?

Directory enumeration tools like DirBuster can expose ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
16 views
0 votes
0 answers

How can I determine if there is a session hijacking vulnerability?

What techniques or tools can I use ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
15 views
0 votes
0 answers

How can API method parameter enumeration be performed via a web browser?

What are the steps to manually enumerate ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
15 views
0 votes
1 answer

How can user enumeration be prevented on a registration page?

To prevent user enumeration on a registration ...READ MORE

Dec 9 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
32 views
0 votes
1 answer

How can client-side encryption be applied for a user with multiple devices?

Using client-side encryption for users who own ...READ MORE

Dec 9 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
31 views
0 votes
1 answer

How can user enumeration be a threat when creating accounts on platforms like Google?

On sites like Google, user enumeration can ...READ MORE

Dec 9 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
30 views
0 votes
0 answers

What is the best way to prevent user enumeration when updating email addresses?

In scenarios where users can change their ...READ MORE

Dec 10 in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
23 views
0 votes
0 answers

What is the best way to test for username enumeration risks?

I’m trying to identify username enumeration vulnerabilities ...READ MORE

Dec 10 in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
21 views
0 votes
1 answer

What risks are associated with account enumeration during verification-less signups?

Verification-less sign-ups can, in fact, bring account ...READ MORE

Dec 9 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
23 views
0 votes
1 answer

How can I understand secure multi-party circuits for stable matching?

Secure multi-party computation (MPC) lets several parties compute ...READ MORE

Dec 9 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
23 views
0 votes
0 answers

Why do some bug bounties ignore user enumeration vulnerabilities?

I’ve noticed that some bug bounty programs ...READ MORE

Dec 10 in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
19 views
0 votes
0 answers

What is the purpose of subdomain enumeration?

Subdomain enumeration is a common step in ...READ MORE

Dec 10 in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
16 views
0 votes
0 answers

Is CAPTCHA sufficient to prevent user enumeration?

Many sites implement CAPTCHAs to deter bots. ...READ MORE

Dec 10 in Cyber Security & Ethical Hacking by Anupam
• 6,410 points
16 views
0 votes
1 answer

What is the Randstorm vulnerability?

The Randstorm vulnerability is a possible or ...READ MORE

Dec 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
36 views
0 votes
1 answer

What is the difference between TEE and HSM in Android Pie?

Both Trusted Execution Environment (TEE) and Hardware ...READ MORE

Dec 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
28 views
0 votes
1 answer
0 votes
1 answer

For LUKS, how many iterations are sufficient to ensure security?

PBKDF2 is used to determine the number ...READ MORE

Dec 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
22 views
0 votes
1 answer

How does JWE secure the Content Encryption Key?

In JSON Web Encryption (JWE), the Content ...READ MORE

Dec 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
19 views
0 votes
1 answer

How can asymmetric encryption be applied to user data to allow unauthenticated input?

Asymmetric encryption can be effectively applied to ...READ MORE

Dec 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
27 views
0 votes
1 answer

Are API encryption key vault services truly secure?

API encryption key vault services can be ...READ MORE

Dec 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
24 views
0 votes
1 answer

Can ML-KEM be used for purposes other than exchanging AES-GCM keys?

Yes, ML-KEM (Message-Locked Key Encapsulation Mechanism) can ...READ MORE

Dec 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
23 views
0 votes
1 answer

How can I get a 12-byte authentication tag in AES-GCM?

To generate a 12-byte (96-bit) authentication tag ...READ MORE

Dec 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
21 views
0 votes
1 answer

Do integrity and authentication always go hand-in-hand, and why?

Integrity and authentication often go hand-in-hand, but ...READ MORE

Dec 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
19 views
0 votes
1 answer

What are the best practices for cryptography in this scenario?

Here are the Top 5 Best Practices ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
34 views
0 votes
1 answer

How can I pass user identity to a different REST service?

To securely pass user identity between REST ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
32 views
0 votes
1 answer

How does a Key Distribution Center (KDC) distribute the session key in symmetric encryption?

A Key Distribution Center (KDC) securely distributes ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
32 views
0 votes
1 answer
0 votes
1 answer

How can I explain to non-tech friends why "cryptography is good"?

Using relevant examples and highlighting its daily ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
27 views
0 votes
1 answer

What encryption and decryption algorithms are used in GSM?

GSM (Global System for Mobile Communications) uses ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
30 views
0 votes
1 answer

Are encryption algorithms designed to hinder parallelization, and if so, why?

Encryption algorithms are often designed to resist ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
20 views
0 votes
1 answer

In Veracrypt, which encryption algorithm and hash algorithm should I use?

Choosing the right encryption and hash algorithms ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,330 points
18 views