Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

how to find host name from IP with out login to the host

To find host name from IP you ...READ MORE

Feb 20, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
89,030 views
0 votes
1 answer

how to find ip address in cmd

1. Open the Command Prompt.   a. Click the Start icon, ...READ MORE

Feb 9, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
47,690 views
0 votes
0 answers

Is there a reason why legit websites are using this type of obfuscation?

Some legitimate websites use obfuscation techniques, even ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
26 views
0 votes
0 answers

Does obfuscation provide true encryption and is it very secure?

There’s often confusion between obfuscation and encryption. ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
24 views
0 votes
0 answers

Is encoding the same as encryption for malware obfuscation?

I’ve noticed that encoding and encryption are ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
24 views
0 votes
0 answers

How to spamproof a mailto link?

When adding a mailto link to a ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
22 views
0 votes
0 answers

Why is XOR used in cryptography?

XOR (exclusive OR) seems to be a ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
20 views
0 votes
0 answers

How to avoid key-loggers when authenticating access?

Key-loggers pose a significant threat to secure ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
16 views
0 votes
0 answers

What are the three most common techniques used to obfuscate data?

Data obfuscation is often used to enhance ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
14 views
0 votes
0 answers

How to best obfuscate a built-in key in an application?

I need to include a key in ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
14 views
0 votes
0 answers

Is it possible to build unbreakable Protocol Obfuscation?

With protocol obfuscation, is it theoretically possible ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
23 views
0 votes
0 answers

What is collision resistance in a hash function?

I’ve come across the term “collision resistance” ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
20 views
0 votes
0 answers

What is the difference between hashing and masking?

Hashing and masking are often mentioned in ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
20 views
0 votes
0 answers

Which hashing algorithm does not have known collision attacks?

Are there any hashing algorithms currently in ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
18 views
0 votes
0 answers

Is code obfuscation common in FOSS?

In Free and Open-Source Software (FOSS), is ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
18 views
0 votes
0 answers

Is encryption in HTTPS done by the browser or by the system?

When a browser establishes an HTTPS connection, ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
19 views
0 votes
0 answers

How is the public key included in the CSR?

When creating a Certificate Signing Request (CSR), ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
19 views
0 votes
0 answers

Is HTTP Authorization header encrypted?

When sending an HTTP Authorization header over ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
19 views
0 votes
0 answers

Does code obfuscation give any measurable security benefit?

I’ve seen code obfuscation used to make ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
18 views
0 votes
0 answers

Which SSH key is more secure?

I’m trying to decide which SSH key ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
18 views
0 votes
0 answers

How Can P2P Systems Recover Compromised Identities Using a Web-of-Trust?

In peer-to-peer systems, if an identity is ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
17 views
0 votes
0 answers

What happens if an SSL certificate is not renewed?

When an SSL certificate expires and is ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
17 views
0 votes
0 answers

What are the security risks of expired SSL certificates?

If a website’s SSL certificate expires, what ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
17 views
0 votes
0 answers

Which is better: SSH RSA or SSH DSS?

Between RSA and DSS (DSA) keys for ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
16 views
0 votes
0 answers

Which SSH security is stronger?

With SSH, various algorithms and configurations are ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
16 views
0 votes
0 answers

Is SSH public key authentication secure?

SSH public key authentication is often recommended ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
15 views
0 votes
1 answer

Which Nmap scan does not completely open a TCP connection?

In Nmap, the SYN scan (-sS) is ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
79 views
0 votes
1 answer

How to Detect and Secure Vulnerable Open Ports and Services?

Detecting and securing vulnerable open ports and ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
57 views
0 votes
1 answer
0 votes
1 answer

Why is Nmap not showing open ports?

When Nmap fails to detect open ports ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
54 views
0 votes
1 answer

Is it possible to get a list of services running on an open port?

Yes, it is possible to identify services ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
48 views
0 votes
1 answer

How to Secure Windows Services with Open Ports Without Compromising Functionality?

Securing Windows services that require open ports ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
39 views
0 votes
1 answer
0 votes
1 answer

What are the categories of security control?

Security controls are essential measures implemented to ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
33 views
0 votes
1 answer

What are the steps of risk assessment in information security?

Conducting a comprehensive risk assessment in information ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
33 views
0 votes
1 answer

How secure is binding to localhost in order to prevent remote connections?

Binding a server to localhost (127.0.0.1) is ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
30 views
0 votes
1 answer

Are control categories actually exclusive in security?

In information security, controls are commonly categorized ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
30 views
0 votes
1 answer

What is IP address conflict with another system on the network?

An IP address conflict occurs when two ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
28 views
0 votes
1 answer
0 votes
1 answer

What is the difference between data flow and control flow?

In programming and systems design, control flow ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
28 views
0 votes
1 answer

How to Speed Up Nmap SSL Service Detection on Non-Standard Ports?

Scanning for SSL services on non-standard ports ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
25 views
0 votes
1 answer

Are Security Controls Overlapping?

In information security, overlapping controls, where a ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
23 views
0 votes
0 answers
0 votes
0 answers

How to determine the hashing algorithm of a public key in the certificate?

I’ve been looking at an SSL/TLS certificate ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
27 views
0 votes
0 answers

Why does Nmap show closed ports?

I’ve been running Nmap scans, and I’ve ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
27 views
0 votes
0 answers

Can there be multiple private keys for one public key?

Is it possible to have multiple private ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
26 views
0 votes
0 answers

Does a private key always generate the same public key?

If I generate a private key, will ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
25 views
0 votes
0 answers

Why should you not block or close ports in a firewall?

I’ve heard mixed opinions about blocking or ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
24 views
0 votes
0 answers

How do I check if a port is open in Nmap?

I’m trying to check if a specific ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
23 views
0 votes
0 answers