Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

How to create a proxy server?

To set up a basic proxy server, ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
21 views
0 votes
1 answer

How to exploit open ports?

Exploiting open ports is a common attack ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
17 views
0 votes
1 answer

How to store passwords in a database?

To securely store passwords in a database, ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
17 views
0 votes
1 answer
0 votes
1 answer
0 votes
1 answer
0 votes
1 answer

What methods can I use in JavaScript to detect and prevent clickjacking attacks?

In order to protect our application against ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
27 views
0 votes
1 answer

What coding methods can prevent steganography attacks within image files?

To prevent or detect steganography attacks within ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
25 views
0 votes
1 answer

What methods can be employed to scan uploaded files for malware before processing?

In order to effectively scan uploaded files ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
23 views
0 votes
1 answer
0 votes
1 answer
0 votes
1 answer

How can developers detect and block image-based malware in their applications?

To detect and block image-based malware in ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
21 views
0 votes
1 answer

What coding practices can help detect unauthorized removable devices connected to a system?

In order to detect unauthorized removable devices ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
17 views
0 votes
0 answers

How do I identify available NFS shares on a remote server?

I’m trying to enumerate Network File System ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
30 views
0 votes
0 answers

How do I use Metasploit to perform NetBIOS enumeration on a target?

I’d like to use Metasploit to perform ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
26 views
0 votes
0 answers

How can I enumerate valid email addresses using SMTP enumeration techniques?

For a security audit, I’m trying to ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
25 views
0 votes
0 answers

How do I use tools like ldapsearch for LDAP enumeration?

I’ve been advised to use ldapsearch for ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
25 views
0 votes
0 answers

What tools can I use to enumerate time servers and check for misconfigurations?

I want to identify and evaluate time ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
24 views
0 votes
0 answers

What LDAP query can be used to enumerate all users in a directory?

I’m trying to list all users within ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
24 views
0 votes
0 answers

How can I perform LDAP enumeration to extract user account information?

I want to use LDAP enumeration to ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
24 views
0 votes
0 answers

How can I enumerate NTP servers and their configurations using command-line tools?

I want to gather information on Network ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
22 views
0 votes
0 answers

How can I extract sensitive information from SNMP-enabled devices?

I’m interested in understanding how to retrieve ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
20 views
0 votes
0 answers

How can message-based phishing attacks be detected programmatically?

I’m exploring ways to detect phishing attacks ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
22 views
0 votes
0 answers

How can I enumerate SNMP information using tools like snmpwalk?

I need to gather SNMP information for ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
18 views
0 votes
1 answer
0 votes
1 answer

What C or C++ libraries can help in developing custom security tools for ethical hacking?

Here are some C/C++ libraries commonly used ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
58 views
0 votes
1 answer

What tools can I build in Ruby to automate penetration testing tasks?

Ruby is a versatile language that is ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
59 views
0 votes
1 answer

How to prevent brute force attacks using Node and Express.js?

To prevent brute-force attacks in a Node ...READ MORE

Nov 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
74 views
0 votes
1 answer

How to prevent Client-Side XSS in JavaScript?

To prevent client-side XSS attacks in your ...READ MORE

Nov 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
72 views
0 votes
1 answer
0 votes
1 answer

Is there a SHA that’s guaranteed to produce a unique hash?

No cryptographic hash function, including SHA, can ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
48 views
0 votes
1 answer

What SQL queries can be used to test for SQL injection vulnerabilities in a database?

When testing for SQL injection vulnerabilities, you ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
44 views
0 votes
1 answer

How to encrypt data that needs to be decrypted in Node.js?

To securely encrypt and decrypt data in ...READ MORE

Nov 6 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
47 views
0 votes
1 answer

What’s the best way to prevent clickjacking attacks on an Express.js-based web application?

To prevent clickjacking attacks on your Express.js ...READ MORE

Nov 5 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
45 views
0 votes
1 answer

What can the skills developed by cybersecurity professionals be used for?

Cybersecurity skills have a broad range of ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
198 views
0 votes
1 answer

What is the difference between Software Development vs Cybersecurity?

Choosing between software development and cybersecurity is ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
63 views
0 votes
0 answers

Why am I unable to gain a shell on a remote system despite finding a vulnerability?

I’ve found a vulnerability on a remote ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
89 views
0 votes
1 answer

How worth it is the CISSP?

I passed through the process of achieving ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
43 views
0 votes
1 answer

What should be in my resume to get a job in cybersecurity?

If you're thinking of transitioning into a ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
37 views
0 votes
1 answer

What is a better or more interesting future profession: cybersecurity or software developer/programmer?

When considering the future of cybersecurity versus ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
35 views
0 votes
0 answers

Why can't I obtain a user token from a compromised API?

During a penetration testing exercise, I was ...READ MORE

Oct 25 in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
46 views
0 votes
1 answer

How do I perform a CSRF attack to change user account settings without authorization?

A Cross-Site Request Forgery (CSRF) attack is ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
69 views
0 votes
1 answer

How do I find and exploit an insecure API endpoint in a mobile app?

In order to locate and test insecure ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
70 views