Trending questions in Cyber Security & Ethical Hacking

+1 vote
1 answer

Are Cybersecurity and Information Security the same thing?

Cybersecurity and information security are related but ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
58 views
+1 vote
1 answer

Can hackers hide their info from netstat?

Yes, attackers can hide their network activity ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
60 views
+1 vote
1 answer

How can I utilize Java to build a simple vulnerability scanner for web applications?

In order to build a simple vulnerability ...READ MORE

Oct 23 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
80 views
+1 vote
1 answer

Why is my brute-force attack on a web application failing after a few attempts?

If your brute-force attack is failing after ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
54 views
+1 vote
1 answer

How do I start learning cybersecurity?

It's awesome that you're gaining interest in ...READ MORE

Oct 24 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
49 views
+1 vote
1 answer

How does the LIMIT clause in SQL queries lead to injection attacks?

The LIMIT clause in SQL can indeed ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
274 views
+1 vote
1 answer

What methods can I use in JavaScript to detect and prevent clickjacking attacks?

In order to prevent clickjacking attacks, we ...READ MORE

Oct 23 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
143 views
+1 vote
1 answer

How can I use PHP to securely handle user sessions and prevent session hijacking?

In order to securely handle user sessions ...READ MORE

Oct 23 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
128 views
+1 vote
1 answer
+1 vote
1 answer

How can I conduct reverse DNS lookups efficiently using DNS footprinting methods?

Reverse DNS lookup allow users to map ...READ MORE

Oct 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
153 views
+1 vote
1 answer

What is the role of WHOIS data in DNS footprinting and how can I automate retrieval?

WHOIS data is essential in DNS footprinting ...READ MORE

Oct 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
152 views
+1 vote
1 answer
+1 vote
1 answer

Can you show me an example of using DNS dig commands in a Python script?

You can run shell commands like dig ...READ MORE

Oct 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
141 views
+1 vote
1 answer
+1 vote
1 answer

What is the best way to use APIs for DNS footprinting in Node.js?

There are several APIs that can help ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
172 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
131 views
+1 vote
1 answer

How can I use Python for web scraping to gather information during reconnaissance?

Python is considered to be an excellent ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
129 views
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
127 views
0 votes
0 answers

What is the role of DNSSEC in footprinting, and how can I query it programmatically?

I’m currently working on a DNS footprinting ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
174 views
0 votes
0 answers

How do I write a simple PERL script to scan for open ports on a target machine?

I’m learning about network security and I ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
123 views
0 votes
0 answers

How can I use JavaScript to create a basic keylogger for ethical hacking purposes?

I’m exploring ethical hacking techniques and I’ve ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
113 views
0 votes
0 answers

How can I implement basic input validation in Java to prevent common web vulnerabilities?

I’m working on a Java web application, ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
106 views
0 votes
0 answers

How do I use Python's subprocess to run multiple DNS queries in parallel?

I’m working on a Python script that ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
93 views
0 votes
0 answers

Why can't I obtain user token from a compromised API?

Why can't I obtain user token from ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
204 views
0 votes
0 answers

How can PHP be used to create a secure web application to prevent SQL injection?

I’m developing a web application using PHP, ...READ MORE

Oct 17 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
81 views
0 votes
0 answers

what can the skills developed by cybersecurity professionals be used for?

what can the skills developed by cybersecurity ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
136 views
0 votes
0 answers

Why is my brute-force attack on a web application failing after a few attempts?

Why is my brute-force attack on a ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
137 views
0 votes
0 answers
0 votes
0 answers

What should be in my resume to get a job in cyber security?

What should be in my resume to ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
110 views
0 votes
0 answers

Are cyber security and information security the same thing?

Are cyber security and information security the ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
108 views
0 votes
0 answers

Can hackers hide their info from netstat?

Can hackers hide their info from netstat? READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
101 views
0 votes
0 answers

How worth it is the CISSP?

How worth it is the CISSP? READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
81 views
0 votes
0 answers

How do I create a custom Metasploit payload that avoids antivirus detection?

How do I create a custom Metasploit ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
77 views
0 votes
0 answers

How do I evade detection while using a VPN during an attack?

How do I evade detection while using ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
75 views
0 votes
0 answers

How do I find and exploit an insecure API endpoint in a mobile app?

How do I find and exploit an ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
75 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How do I start learning Cybersecurity?

How do I start learning Cybersecurity? READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
54 views
0 votes
0 answers

Can a 42-year-old get into cyber security without an IT background?

Can a 42-year-old get into cyber security ...READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points
55 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

Software Development vs Cyber Security

What is Software Development vs Cyber Security? READ MORE

Oct 14 in Cyber Security & Ethical Hacking by Anupam
• 6,570 points

edited Oct 14 by Hoor 51 views
0 votes
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Decrypting ROT13 encryption is super simple because ...READ MORE

Oct 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,420 points
131 views