Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
54 views
0 votes
1 answer

Would re-salting passwords regularly in-/decrease security?

Regularly re-salting and re-hashing stored passwords—changing the ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
45 views
0 votes
1 answer

Any reason I shouldn't be salting and hashing before putting through bCrypt?

When implementing password security with bcrypt, it's ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
44 views
0 votes
1 answer

How secure is the hashing/salting/stretching process as described in this diagram?

When storing passwords securely, employing a combination ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
39 views
0 votes
1 answer

Can I protect against password hacking just by salting the previous-hash?

Enhancing password security is crucial in safeguarding ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
38 views
0 votes
1 answer

Is salting a hash more secure than encrypting it?

When securing passwords, it's essential to understand ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
35 views
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 10,590 points
30 views
0 votes
1 answer

Does obfuscation provide true encryption and is it very secure?

Obfuscation and encryption are both techniques used ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
79 views
0 votes
1 answer

Is there a reason why legit websites are using this type of obfuscation?

Legitimate websites employ code obfuscation for several ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
72 views
0 votes
1 answer

How to avoid key-loggers when authenticating access?

Keyloggers are malicious tools that record keystrokes ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
68 views
0 votes
1 answer

How to spamproof a mailto link?

Protecting email addresses in mailto links from ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
64 views
0 votes
1 answer

What are the three most common techniques used to obfuscate data?

Data obfuscation involves transforming data to conceal ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
64 views
0 votes
1 answer

How to best obfuscate a built-in key in an application?

Embedding a key directly within an application's ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
62 views
0 votes
1 answer

Is encoding the same as encryption for malware obfuscation?

Encoding and encryption are distinct techniques that ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
60 views
0 votes
1 answer

Why is XOR used in cryptography?

The XOR (exclusive OR) operation is fundamental ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
56 views
0 votes
1 answer

What is the response from an open TCP port which is not behind a firewall?

When you send a TCP SYN packet ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
212 views
0 votes
1 answer

Which is better: SSH RSA or SSH DSS?

When comparing SSH key types, RSA (Rivest–Shamir–Adleman) ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
83 views
0 votes
1 answer

What are the security risks of expired SSL certificates?

An expired SSL certificate poses several security ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
80 views
0 votes
1 answer

What is the difference between hashing and masking?

Hashing and masking are two distinct techniques ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
74 views
0 votes
1 answer

What is collision resistance in a hash function?

Collision resistance is a fundamental property of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
67 views
0 votes
1 answer

Is HTTP Authorization header encrypted?

When transmitting an HTTP Authorization header over ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
62 views
0 votes
1 answer

Which hashing algorithm does not have known collision attacks?

When selecting a hashing algorithm, it's crucial ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
58 views
0 votes
1 answer

How is the public key included in the CSR?

When creating a Certificate Signing Request (CSR), ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
59 views
0 votes
1 answer

Is it possible to build unbreakable Protocol Obfuscation?

Achieving unbreakable protocol obfuscation—where a system is entirely ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
57 views
0 votes
1 answer

What happens if an SSL certificate is not renewed?

When an SSL certificate expires and is ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
57 views
0 votes
1 answer

Does code obfuscation give any measurable security benefit?

Code obfuscation involves deliberately making code difficult ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
52 views
0 votes
1 answer

Is code obfuscation common in FOSS?

In Free and Open-Source Software (FOSS), code ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
49 views
0 votes
1 answer

Is encryption in HTTPS done by the browser or by the system?

When a browser establishes an HTTPS connection, ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
48 views
0 votes
1 answer

Which SSH key is more secure?

When selecting an SSH key type for ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
48 views
0 votes
1 answer

Which SSH security is stronger?

Ensuring robust SSH security involves careful selection ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
47 views
0 votes
1 answer

Is SSH public key authentication secure?

SSH public key authentication is generally more ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
47 views
0 votes
1 answer

How Can P2P Systems Recover Compromised Identities Using a Web-of-Trust?

In peer-to-peer (P2P) systems, the Web of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
46 views
0 votes
1 answer

Which Nmap scan does not completely open a TCP connection?

In Nmap, the SYN scan (-sS) is ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
128 views
0 votes
1 answer

How to Detect and Secure Vulnerable Open Ports and Services?

Detecting and securing vulnerable open ports and ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
119 views
0 votes
1 answer

Is true or false the Nmap tool can be used to identify ports on a target system?

True, Nmap is a versatile network scanning ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
75 views
0 votes
1 answer

Can there be multiple private keys for one public key?

In public-key cryptography, each public key is ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
72 views
0 votes
1 answer

What is the difference between data flow and control flow?

In programming and systems design, control flow ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
113 views
0 votes
1 answer

Why is Nmap not showing open ports?

When Nmap fails to detect open ports ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
110 views
0 votes
1 answer

How to determine the hashing algorithm of a public key in the certificate?

To determine the hashing algorithm used to ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
69 views
0 votes
1 answer

Does a private key always generate the same public key?

Yes, a private key always generates the ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
68 views
0 votes
1 answer

Why does Nmap show closed ports?

When Nmap reports a port as closed, ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
64 views
0 votes
1 answer

Why should you not block or close ports in a firewall?

Blocking or closing ports in a firewall ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
59 views
0 votes
1 answer
0 votes
1 answer

How do I check if a port is open in Nmap?

To check if a specific port is ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
53 views
0 votes
1 answer

Is it possible to get a list of services running on an open port?

Yes, it is possible to identify services ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
90 views
0 votes
1 answer

What are the steps of risk assessment in information security?

Conducting a comprehensive risk assessment in information ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
85 views
0 votes
1 answer

What is IP address conflict with another system on the network?

An IP address conflict occurs when two ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
84 views
0 votes
1 answer

What are the categories of security control?

Security controls are essential measures implemented to ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
82 views
0 votes
1 answer
0 votes
1 answer

How to Secure Windows Services with Open Ports Without Compromising Functionality?

Securing Windows services that require open ports ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
73 views