Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

how to find host name from IP with out login to the host

To find host name from IP you ...READ MORE

Feb 20, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
87,308 views
0 votes
1 answer

how to find ip address in cmd

1. Open the Command Prompt.   a. Click the Start icon, ...READ MORE

Feb 9, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
47,507 views
0 votes
0 answers

How to call someone from a different number?

I’m curious about the concept of spoofing ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
41 views
0 votes
0 answers

How to fix cross-site scripting vulnerability in Java?

My Java-based web application has been flagged ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
20 views
0 votes
0 answers

What are the methods for enumerating FTP users and shares securely?

During a penetration test, I need to ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
20 views
0 votes
0 answers

How do I leverage tools like NSlookup for DNS enumeration?

I'm exploring DNS enumeration and want to ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
20 views
0 votes
0 answers

How can I perform enumeration on SMB shares and their permissions?

I want to gather information about SMB ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
19 views
0 votes
0 answers

How can we prevent dictionary attacks on password hashes?

To protect user accounts, I want to ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
13 views
0 votes
0 answers

How to secure an API without authentication?

I have an API that can’t rely ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
12 views
0 votes
0 answers

How to prevent clickjacking in HTML?

I want to secure my web application ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
12 views
0 votes
0 answers

How is IP address spoofing detected?

I'm researching network security and want to ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
11 views
0 votes
0 answers

What commands can be used to perform DNS enumeration to discover subdomains?

I want to identify subdomains of a ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
6 views
0 votes
0 answers

How to spoof an IP address?

I'm researching network security and looking into ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
10 views
0 votes
0 answers

How to verify a signature in a PDF?

I need to confirm the authenticity of ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
8 views
0 votes
0 answers

How does a hash function work?

I'm trying to understand how hash functions ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
7 views
0 votes
0 answers

How to get an HTTPS certificate?

For my application, I need to set ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
7 views
0 votes
0 answers

How to set the secure flag on cookies?

In my web application, I want to ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
13 views
0 votes
0 answers

How to prevent XSS attacks in JavaScript?

I’m concerned about protecting my web application ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
13 views
0 votes
0 answers

How to get the proxy IP address?

I’m setting up an application that requires ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
11 views
0 votes
0 answers

How to convert CRT to PFX?

I have an SSL certificate in .crt ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
11 views
0 votes
0 answers

How to validate a digital signature in a PDF?

In my project, I need to verify ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
10 views
0 votes
0 answers

How to close a port in Linux?

I'm working on securing my Linux server ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
9 views
0 votes
0 answers

How to store passwords?

For my application, I need to securely ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
7 views
0 votes
0 answers

How to verify an SSL certificate?

In my application, I need to confirm ...READ MORE

4 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
7 views
0 votes
0 answers

How to hide code in HTML?

In my web project, I want to ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
30 views
0 votes
0 answers

How do we check if a user is logged in?

I’m building an application where I need ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
22 views
0 votes
0 answers

How to escape a single quote in SQL?

When handling user inputs in SQL queries, ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
24 views
0 votes
0 answers

How to test SQL injection manually?

I’m learning about SQL injection vulnerabilities and ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points

retagged 4 days ago by Anupam 19 views
0 votes
0 answers

How to get a JWT token from the browser?

I’m implementing JWT-based authentication and need to ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
19 views
0 votes
0 answers

How does hashing work?

I’m learning about data security and need ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
22 views
0 votes
0 answers

How to implement end-to-end encryption?

In my application, I want to ensure ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
18 views
0 votes
0 answers

How to send a token in the header?

In my API-based application, I need to ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
18 views
0 votes
0 answers

How does a CSRF token work?

I’m exploring CSRF protection for my application ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
19 views
0 votes
0 answers

How to use SSH in IoT?

I'm working with IoT devices and exploring ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
14 views
0 votes
0 answers

How to validate a signature?

I'm implementing digital signatures to verify data ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
13 views
0 votes
0 answers

How can we invalidate a session?

In a web application, I need to ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
16 views
0 votes
0 answers

How to store passwords in a database?

I'm developing an application that requires storing ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
15 views
0 votes
0 answers

How to handle multiple requests at the same time?

In my application, I need to process ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
15 views
0 votes
0 answers

How to decrypt encrypted files?

I’m learning about data encryption and would ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
12 views
0 votes
0 answers

How to find others WiFi password?

I'm interested in understanding network security and ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by Anupam
• 3,470 points
12 views
0 votes
1 answer

How can I enumerate NetBIOS shares on a Windows machine using command-line tools?

In order to enumerate NetBIOS shares on ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
55 views
0 votes
1 answer

How can developers implement secure file handling to prevent file-based attacks?

In order to securely handle files and ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
53 views
0 votes
1 answer

How to get a WiFi password using CMD?

Yes, there's a way to retrieve the ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
30 views
0 votes
1 answer

How to invalidate a JWT token?

To invalidate a JWT token effectively, here ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
29 views
0 votes
1 answer

How to send a bearer token in a header?

To send a bearer token in an ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
27 views
0 votes
1 answer

What techniques can be used to sanitize image uploads and prevent malicious payloads?

In order to securely handle image uploads ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
48 views
0 votes
1 answer

How to encrypt an SD card without the original device?

Yes, you can encrypt an SD card ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
25 views
0 votes
1 answer

How to make a unique ID?

To create unique IDs, you can use ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
24 views
0 votes
1 answer

How to lock a pen drive with a password on a mobile device?

In order to password-protect a USB (pen) ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
24 views
0 votes
1 answer

How to find subdomains of a domain?

To enumerate subdomains of a domain, there ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 2,960 points
21 views