Trending questions in Cyber Security & Ethical Hacking

0 votes
0 answers

When should you use TCP over UDP for network communication?

TCP and UDP have different strengths based ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
370 views
0 votes
1 answer

How do you detect brute force login attempts in Apache logs?

Monitoring Apache web server logs is essential ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
701 views
0 votes
0 answers

What happens when a packet moves through the OSI layers?

When a packet moves through the OSI ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
358 views
0 votes
0 answers

How do you analyze buffer overflow exploits in a web server?

I am researching buffer overflow vulnerabilities in ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
436 views
0 votes
0 answers

How is data transmission done in the OSI model?

I want to understand how data moves ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
388 views
0 votes
0 answers

How does a computer network enable communication between devices?

I am trying to understand how data ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
386 views
0 votes
0 answers

What’s the purpose of network architecture layers?

I know that network communication is structured ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
379 views
0 votes
0 answers

How to track deleted log files in a compromised Linux system?

After a suspected security incident, I discovered ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
416 views
0 votes
1 answer

How does an attacker escalate privileges via SUID misconfigurations?

In Unix-like operating systems, the Set User ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
587 views
0 votes
1 answer

How to use Metasploit to exploit unpatched web applications?

Metasploit is a powerful framework used in ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
585 views
0 votes
1 answer

How does an attacker bypass CSP (Content Security Policy)?

Content Security Policy (CSP) is a critical ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
577 views
0 votes
1 answer

How to detect open ports on a web server using Python?

Conducting a security audit to identify open ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
685 views
0 votes
1 answer

How do I remove a service connection point in Active Directory?

Removing a Service Connection Point (SCP) from ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,029 views
0 votes
0 answers

How does a client-server network differ from a peer-to-peer?

I am trying to understand the fundamental ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
332 views
0 votes
1 answer

How to identify CORS error?

Encountering Cross-Origin Resource Sharing (CORS) errors during ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points

edited Mar 6 374 views
0 votes
0 answers

How to write a script to detect anomalous login locations?

I am trying to improve security monitoring ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
358 views
0 votes
1 answer

How to automate patching web server vulnerabilities with Ansible?

Automating the patching of web server vulnerabilities ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
518 views
0 votes
0 answers

How to secure cookie attributes against session hijacking?

I am working on securing user sessions ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
338 views
0 votes
1 answer

How can malware be hidden using NTFS Alternate Data Streams?

NTFS Alternate Data Streams (ADS) are a ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
509 views
0 votes
1 answer

How to script a privilege escalation attack simulation in Linux?

Simulating a privilege escalation attack in Linux ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
558 views
0 votes
1 answer

What are the security risks of hole punching in IoT?

NAT (Network Address Translation) hole punching is ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
637 views
0 votes
1 answer

How can DNS poisoning be used to compromise web applications?

DNS poisoning, also known as DNS spoofing ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points

edited Mar 6 454 views
0 votes
1 answer

How do IoT devices know the checksum of firmware upgrades?

When Internet of Things (IoT) devices perform ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
626 views
0 votes
1 answer

How to analyze malicious web shell uploads in a web server?

Analyzing potential web shell uploads on a ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
452 views
0 votes
0 answers

How to automate malware scanning on a web server using ClamAV?

I want to automatically scan my web ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
273 views
0 votes
1 answer

How to prevent password cracking using salting and hashing?

To safeguard passwords against brute-force and dictionary ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
447 views
0 votes
1 answer

How do you parse Apache access logs?

Parsing Apache access logs is essential for ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
442 views
0 votes
1 answer

How to write a script to check for insecure HTTP headers?

Ensuring the security of your web application ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
432 views
0 votes
0 answers

How can a CSRF vulnerability be exploited in an insecure app?

I am testing a web application for ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
299 views
0 votes
1 answer

How to configure WAF rules for mitigating RFI attacks?

Mitigating Remote File Inclusion (RFI) attacks is ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
490 views
0 votes
1 answer

How do you detect SQL injection attacks?

Detecting SQL injection (SQLi) attacks is crucial ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
521 views
0 votes
1 answer

How can you exploit file upload vulnerabilities in PHP apps?

File upload vulnerabilities in PHP applications pose ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
465 views
0 votes
1 answer

How to use Burp Suite to analyze a web application attack?

Burp Suite is a comprehensive platform for ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
498 views
0 votes
1 answer

How do I get a list of service accounts in Active Directory?

To list all service accounts in your ...READ MORE

Feb 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
811 views
0 votes
1 answer

What is the most common vulnerability associated with IoT devices?

The Internet of Things (IoT) has revolutionized ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
532 views
0 votes
1 answer

Can apps access other apps RAM on iOS?

iOS enforces strict memory isolation between applications ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
469 views
0 votes
1 answer

What are the defensive measures against session hijacking attacks?

Session hijacking is a critical security concern ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
452 views
0 votes
1 answer

How to secure a Linux web server?

Securing a Linux web server involves implementing ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
425 views
0 votes
1 answer

How can we protect against the evil twin?

An Evil Twin attack involves an attacker ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
460 views
0 votes
1 answer

How can you automate patch management with PowerShell?

Automating patch management across multiple Windows machines ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
411 views
0 votes
1 answer

Is Safari a safe browser for iPhone?

Safari on iPhone is designed with a ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
402 views
0 votes
1 answer

Is WebGL a security concern?

WebGL (Web Graphics Library) is a JavaScript ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
759 views
0 votes
1 answer

How do so many vulnerable IoT devices stay alive and online?

The persistence of vulnerable Internet of Things ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
433 views
0 votes
1 answer

What if IoT devices are fabricated with random passwords?

Manufacturing IoT devices with unique, random passwords ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
371 views
0 votes
1 answer

Can static IP addressing prevent IoT botnets?

The use of static versus dynamic IP ...READ MORE

Feb 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
586 views
0 votes
1 answer

Is there any reason not to salt and hash before using bcrypt?

When implementing password hashing with bcrypt, it's ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
636 views
0 votes
1 answer

Should I allow apps to communicate through Windows Firewall?

When Windows Firewall prompts you to allow ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
588 views
0 votes
1 answer

Can there be multiple private keys for one public key?

In traditional public-key cryptography systems like RSA ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
642 views
0 votes
1 answer

How secure is the hashing/salting/stretching process as described in this diagram?

When storing passwords securely, employing a combination ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
646 views
0 votes
1 answer

How do you check whether the password is strong or not?

Ensuring that passwords meet strong security standards ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
549 views