Trending questions in Cyber Security & Ethical Hacking

0 votes
2 answers

Why is cyber security important?

Well, Cybersecurity is important because it encompasses everything that ...READ MORE

Oct 24, 2020 in Cyber Security & Ethical Hacking by masterronny
• 180 points

edited Oct 24, 2020 by Gitika 1,752 views
+1 vote
1 answer

Can't install arpspoof

Hi, I think you didn't enable the repositories. ...READ MORE

Oct 20, 2020 in Cyber Security & Ethical Hacking by MD
• 95,460 points
2,226 views
+1 vote
3 answers

How to start learning cyber security?

You can easily become a cybersecurity specialist ...READ MORE

Oct 24, 2020 in Cyber Security & Ethical Hacking by masterronny
• 180 points

edited Oct 24, 2020 by Gitika 1,298 views
0 votes
2 answers

I am unable to get network in my kali linux.

Hey, @Pratyusha, Kali comes with networking disabled by ...READ MORE

Apr 28, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,770 points
3,214 views
0 votes
1 answer

What are the five steps of ethical hacking?

The 5 major steps involved in ethical ...READ MORE

Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 6,856 views
+1 vote
1 answer

can i run localhost in virtual machines if i enabled it in windows?

Hi, @Soujanya, Windows has its "own" localhost, so you ...READ MORE

May 26, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,770 points
1,713 views
0 votes
1 answer

What is enumeration in ethical hacking?

Enumeration is a part of the first ...READ MORE

Feb 3, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 5,474 views
0 votes
1 answer

ARP Spoofing stops victim internet connection.

This happens if you have not enabled ...READ MORE

Jul 25, 2019 in Cyber Security & Ethical Hacking by Anis
13,566 views
0 votes
1 answer

What is the best books for hacking beginners to advace and also networking please refer good books ?

Here's the booklist for Ethical hacking for ...READ MORE

Apr 20, 2020 in Cyber Security & Ethical Hacking by Kim

edited Oct 7, 2021 by Sarfaraz 1,347 views
0 votes
1 answer

how to install Damn Vulnerable Web Application?

I suggest you go through this https://www.edureka.co/blog/application-security-tutorial/ It would ...READ MORE

May 4, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 669 views
0 votes
2 answers

what are the requirements for ethical hacking?

First, we try to know what is ...READ MORE

Mar 21, 2020 in Cyber Security & Ethical Hacking by ronny
• 140 points
3,417 views
0 votes
2 answers

does kali linux provide all services of ethical hacking in one application

Hey, @Vatsal, Almost all the services of Ethical ...READ MORE

Apr 21, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,770 points

edited Oct 6, 2021 by Sarfaraz 778 views
+3 votes
1 answer

How to send the phishing link to friend?

The Social Engineer Toolkit (SET) is a ...READ MORE

Feb 6, 2020 in Cyber Security & Ethical Hacking by anonymous
1 flag 3,917 views
+1 vote
1 answer

When i am installing setoolkit this error is appear?

Looks like a permission issue. Try executing ...READ MORE

Apr 6, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points
1,069 views
0 votes
2 answers

How to manage network using a router?

Security and data logging.. Simple READ MORE

Dec 20, 2020 in Cyber Security & Ethical Hacking by Pavan Billore
3,002 views
0 votes
1 answer

What programming languages should a ethical hacker know?

An Certified Ethical Hacker is a  computer expert, who specializes ...READ MORE

Feb 3, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 1,632 views
0 votes
1 answer

How python is used in ethical hacking?

It is common practice amongst ethical hackers ...READ MORE

Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 1,102 views
0 votes
1 answer

what is footprinting in ethical hacking?

Footprinting is a part of the Reconnaissance phase of ...READ MORE

Feb 3, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 1,021 views
0 votes
1 answer

How to get ethical hacking certification?

A certification like Certified Ethical Hacker (CEH) will ...READ MORE

Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 1,109 views
+1 vote
1 answer

How much does a cyber security engineer make or earn?

Cybersecurity job market is fast-growing and the ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 1,118 views
0 votes
1 answer

What degree do I need for working in the cyber security domain?

While it’s possible to find certain entry-level ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points
1,130 views
+1 vote
1 answer

How to get into ethical hacking?

How to become an ethical hacker very much ...READ MORE

Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 940 views
0 votes
1 answer

What does a cyber security analyst do?

Cybersecurity analyst (sometimes called information security analyst) ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points
1,008 views
0 votes
1 answer

What are some good cyber security habits that everybody should follow?

Cybersecurity is an extremely important concern in today’s ...READ MORE

Jan 30, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 945 views
0 votes
1 answer

What is ethical hacking?

Hacking is referred to as the illegal ...READ MORE

Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 857 views
+1 vote
1 answer

How to learn ethical hacking?

Ethical Hacking is a really interesting field ...READ MORE

Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 763 views
+1 vote
1 answer

How to get into cyber security domain?

The number of cyber-crimes is on an ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 793 views
+1 vote
1 answer

How to learn cyber security?

Ethical Hacking has been a lucrative career ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 774 views
+1 vote
0 answers

How can I encryption/decryption in Rijndael using python

I found this https://github.com/moeenz/rijndael ,but does not ...READ MORE

Sep 28, 2019 in Cyber Security & Ethical Hacking by Ahmed
• 310 points
4,908 views
0 votes
2 answers

What are the commands used for DNS troubleshooting?

ipconfig /flushdns READ MORE

Jun 27, 2020 in Cyber Security & Ethical Hacking by anonymous
2,047 views
0 votes
1 answer

arpspoof: libnet_init(): UID or EUID of 0 required

ARP Spoofing should be done by superusers. ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,220 points
13,732 views
+1 vote
0 answers

best tools for termux non rooted device

i want to know tools and steps ...READ MORE

Aug 1, 2019 in Cyber Security & Ethical Hacking by Sachin
3,632 views
0 votes
1 answer

How to check if MAC Protection is enabled for ViewState in ASP.NET application?

You can check if the ViewState is ...READ MORE

Aug 23, 2019 in Cyber Security & Ethical Hacking by Tina
2,669 views
0 votes
1 answer

What are common software problem that leads to network defect?

According to what I know and have faced, ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 58,020 points
8,900 views
0 votes
1 answer

How to identify Entry points for user input in a web application?

Following are the key entry points for ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Raman
2,109 views
0 votes
1 answer

BurpSuite not capturing packets

Assuming you have made all the proxy ...READ MORE

Aug 8, 2019 in Cyber Security & Ethical Hacking by Karan
1,798 views
0 votes
1 answer

Nikto scan: Handling site returning custom file not found page

This is common with complex websites. To handle ...READ MORE

Aug 21, 2019 in Cyber Security & Ethical Hacking by Krimisha
1,130 views
0 votes
1 answer

When should I prefer Client-side validation checks over Server-side validation checks?

Client-side validation checks are preferred to reduce ...READ MORE

Aug 23, 2019 in Cyber Security & Ethical Hacking by Steven
927 views
0 votes
1 answer

Finding platform or programming language used in web application by file extension

Yes. It is possible to understand the ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Will
977 views
–1 vote
1 answer

Out-of-band channels for entry points in web application hacking

The out-of-band channels for entry depends on ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Daniel
952 views
0 votes
0 answers

I do not have a real result about encryption file use AES mode CFB in pycrptodome on python [closed]

I'm using Ubuntu win. on python I ...READ MORE

Aug 23, 2019 in Cyber Security & Ethical Hacking by Ahmed
• 310 points

closed Aug 23, 2019 by Ahmed 883 views
0 votes
1 answer

How to modify hidden content in a web page?

You can save the source code as ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Emilia
822 views
0 votes
1 answer

Nonstandard query string markers and field separators in a web application

You should definitely consider them as entry ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Likith
822 views
0 votes
1 answer

When should I prefer Server-side validation checks over Client-side validation checks?

Yes, it is true that server-side checks ...READ MORE

Aug 23, 2019 in Cyber Security & Ethical Hacking by Karuna
765 views
0 votes
1 answer

Handling MAC protected ViewState

You can use BurpSuite for this. When ...READ MORE

Aug 23, 2019 in Cyber Security & Ethical Hacking by Juna
743 views
0 votes
1 answer

How does Burpsuite help modify browser requests?

While using Burpsuite, you have to use ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Jishan
780 views
0 votes
1 answer

Is it possible to find technolgy name of a web application using session tokens?

If the web application uses web servers that ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Kumar

edited Oct 7, 2021 by Sarfaraz 764 views
0 votes
1 answer

BurpSuite Spidering: How does new content get discovered?

Actually, it does both. First, it bruteforces ...READ MORE

Aug 21, 2019 in Cyber Security & Ethical Hacking by Tina
708 views
0 votes
1 answer

Why do some webserver send immutable data to client and get it back to the server?

The main reason for this behavior is ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Gemini
649 views
0 votes
1 answer

How to modify indirectly visible data sent to client by user?

Yes, it is possible to modify this ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Jimmy

edited Oct 7, 2021 by Sarfaraz 605 views