Trending questions in Cyber Security & Ethical Hacking

+1 vote
1 answer

Can you show me an example of using DNS dig commands in a Python script?

You can run shell commands like dig ...READ MORE

Oct 21, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
299 views
0 votes
0 answers

How do I write a simple PERL script to scan for open ports on a target machine?

I’m learning about network security and I ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
293 views
0 votes
0 answers

How can I implement basic input validation in Java to prevent common web vulnerabilities?

I’m working on a Java web application, ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
276 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
329 views
+1 vote
1 answer
+1 vote
1 answer

How can I use Python for web scraping to gather information during reconnaissance?

Python is considered to be an excellent ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
288 views
0 votes
0 answers

How do I use Python's subprocess to run multiple DNS queries in parallel?

I’m working on a Python script that ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
207 views
0 votes
0 answers

How can PHP be used to create a secure web application to prevent SQL injection?

I’m developing a web application using PHP, ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
170 views
0 votes
0 answers

Why can't I obtain user token from a compromised API?

Why can't I obtain user token from ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
379 views
0 votes
0 answers

How can I use JavaScript to create a basic keylogger for ethical hacking purposes?

I’m exploring ethical hacking techniques and I’ve ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
292 views
0 votes
0 answers

What is the role of DNSSEC in footprinting, and how can I query it programmatically?

I’m currently working on a DNS footprinting ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
285 views
0 votes
0 answers

what can the skills developed by cybersecurity professionals be used for?

what can the skills developed by cybersecurity ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
338 views
0 votes
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Decrypting ROT13 encryption is super simple because ...READ MORE

Oct 11, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 25,780 points
435 views
0 votes
0 answers
0 votes
0 answers

What should be in my resume to get a job in cyber security?

What should be in my resume to ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
266 views
0 votes
0 answers

Why is my brute-force attack on a web application failing after a few attempts?

Why is my brute-force attack on a ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
307 views
0 votes
0 answers

Are cyber security and information security the same thing?

Are cyber security and information security the ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
260 views
0 votes
0 answers

Can hackers hide their info from netstat?

Can hackers hide their info from netstat? READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
246 views
0 votes
0 answers
0 votes
0 answers

How do I perform a CSRF attack to change user account settings without authorization?

How do I perform a CSRF attack ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
249 views
0 votes
0 answers

How can I use Python for web scraping to gather information during reconnaissance?

How can I use Python for web ...READ MORE

Oct 11, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
328 views
0 votes
0 answers

How worth it is the CISSP?

How worth it is the CISSP? READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
192 views
0 votes
0 answers

What is a better or interesting future profession, cybersecurity or software developer/programmer?

What is a better or interesting future ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
159 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

Software Development vs Cyber Security

What is Software Development vs Cyber Security? READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points

edited Oct 14, 2024 by Hoor 103 views
0 votes
0 answers

How do I create a custom Metasploit payload that avoids antivirus detection?

How do I create a custom Metasploit ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
145 views
0 votes
0 answers

What techniques can I use in Python to analyze logs for potential security breaches?

What techniques can I use in Python ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
145 views
0 votes
0 answers

How do I find and exploit an insecure API endpoint in a mobile app?

How do I find and exploit an ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
143 views
0 votes
0 answers

How can I utilize Java to build a simple vulnerability scanner for web applications?

How can I utilize Java to build ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
132 views
0 votes
0 answers

How do I evade detection while using a VPN during an attack?

How do I evade detection while using ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
130 views
0 votes
0 answers

Can a 42-year-old get into cyber security without an IT background?

Can a 42-year-old get into cyber security ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
118 views
0 votes
0 answers

How do I start learning Cybersecurity?

How do I start learning Cybersecurity? READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 14,700 points
108 views