Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

Can a web server be secured with just a firewall?

Relying solely on a firewall to secure ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
51 views
0 votes
1 answer

Is there any reason not to salt and hash before using bcrypt?

When implementing password hashing with bcrypt, it's ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
48 views
0 votes
1 answer

What is the difference between active and passive Digital Footprints?

A digital footprint encompasses the trail of ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
29 views
0 votes
1 answer

Is WebGL a security concern?

WebGL (Web Graphics Library) is a JavaScript ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
27 views
0 votes
1 answer

Why use manual testing for web server attacks if scanners can detect vulnerabilities?

While automated security scanners are valuable tools ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
38 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes, such as Lamport ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
45 views
0 votes
1 answer

Can there be multiple private keys for one public key?

In traditional public-key cryptography systems like RSA ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
44 views
0 votes
1 answer

Why do digital signatures need different algorithms?

Digital signatures are essential in modern cryptography ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
44 views
0 votes
1 answer

How secure is the hashing, salting, and stretching process in this diagram?

Evaluating the security of your password hashing, ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
39 views
0 votes
1 answer

How is the digital certificate sent alongside digital signatures?

When a digital signature is applied to ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
39 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes (like Lamport signatures, ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
35 views
0 votes
1 answer

Does a digital certificate contain a private key?

Digital certificates are fundamental components of public ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
32 views
0 votes
1 answer

Why don't digital signatures reveal the sender’s private key?

Digital signatures are a cornerstone of modern ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
30 views
0 votes
1 answer

What's the point of salting Double Submit Cookie (CSRF protection)?

The Double Submit Cookie pattern is a ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
48 views
0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
42 views
0 votes
1 answer

Why do passwords need to be salted?

Salting is a crucial practice in password ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
41 views
0 votes
1 answer

Would re-salting passwords regularly in-/decrease security?

Regularly re-salting and re-hashing stored passwords—changing the ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
37 views
0 votes
1 answer

Any reason I shouldn't be salting and hashing before putting through bCrypt?

When implementing password security with bcrypt, it's ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
35 views
0 votes
1 answer

How secure is the hashing/salting/stretching process as described in this diagram?

When storing passwords securely, employing a combination ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
33 views
0 votes
1 answer

Can I protect against password hacking just by salting the previous-hash?

Enhancing password security is crucial in safeguarding ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
29 views
0 votes
1 answer

Is salting a hash more secure than encrypting it?

When securing passwords, it's essential to understand ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
25 views
0 votes
0 answers

Is a router a better device for an IoT botnet than devices within its network?

I've read about IoT botnets and how ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,920 points
63 views
0 votes
0 answers

Can static IP addressing prevent IoT botnets?

I’ve read that some IoT botnets rely ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,920 points
56 views
0 votes
0 answers

Do I need a Gateway Firewall for an IoT network?

I’m setting up an IoT network and ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,920 points
55 views
0 votes
0 answers

Should the local network be checked first to access IoT devices?

I’ve noticed that some IoT devices prioritize ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,920 points
51 views
0 votes
0 answers

How do you secure IoT devices?

With IoT devices being common attack targets, ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,920 points
50 views
0 votes
0 answers

How do you check whether the password is strong or not?

I want to ensure that passwords meet ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,920 points
46 views
0 votes
0 answers

How do I get a list of service accounts in Active Directory?

I need to list all service accounts ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,920 points
41 views
0 votes
0 answers

What are the negative aspects of creating fake security footprints?

I've heard about fake security footprints, where ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,920 points
34 views
0 votes
0 answers

How do I find unused service accounts in Active Directory?

Our AD environment contains several service accounts, ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,920 points
26 views
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 10,090 points
26 views
0 votes
0 answers

How to exploit LDAP injection?

I'm studying LDAP injection for cybersecurity research ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,920 points
23 views
0 votes
1 answer

Does obfuscation provide true encryption and is it very secure?

Obfuscation and encryption are both techniques used ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
74 views
0 votes
1 answer

Is there a reason why legit websites are using this type of obfuscation?

Legitimate websites employ code obfuscation for several ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
60 views
0 votes
1 answer

How to spamproof a mailto link?

Protecting email addresses in mailto links from ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
57 views
0 votes
1 answer

Why is XOR used in cryptography?

The XOR (exclusive OR) operation is fundamental ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
51 views
0 votes
1 answer

Is encoding the same as encryption for malware obfuscation?

Encoding and encryption are distinct techniques that ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
51 views
0 votes
1 answer

How to best obfuscate a built-in key in an application?

Embedding a key directly within an application's ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
49 views
0 votes
1 answer

What are the three most common techniques used to obfuscate data?

Data obfuscation involves transforming data to conceal ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
48 views
0 votes
1 answer

How to avoid key-loggers when authenticating access?

Keyloggers are malicious tools that record keystrokes ...READ MORE

Jan 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
47 views
0 votes
1 answer

What is the response from an open TCP port which is not behind a firewall?

When you send a TCP SYN packet ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
188 views
0 votes
1 answer

What are the security risks of expired SSL certificates?

An expired SSL certificate poses several security ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
65 views
0 votes
1 answer

Which is better: SSH RSA or SSH DSS?

When comparing SSH key types, RSA (Rivest–Shamir–Adleman) ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
61 views
0 votes
1 answer

Which hashing algorithm does not have known collision attacks?

When selecting a hashing algorithm, it's crucial ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
56 views
0 votes
1 answer

Is HTTP Authorization header encrypted?

When transmitting an HTTP Authorization header over ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
57 views
0 votes
1 answer

What is collision resistance in a hash function?

Collision resistance is a fundamental property of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
53 views
0 votes
1 answer

What is the difference between hashing and masking?

Hashing and masking are two distinct techniques ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
51 views
0 votes
1 answer

Is it possible to build unbreakable Protocol Obfuscation?

Achieving unbreakable protocol obfuscation—where a system is entirely ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
50 views
0 votes
1 answer

How is the public key included in the CSR?

When creating a Certificate Signing Request (CSR), ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
48 views
0 votes
1 answer

Which SSH key is more secure?

When selecting an SSH key type for ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 16,200 points
47 views