Trending questions in Cyber Security & Ethical Hacking

0 votes
0 answers

What are some common network threats and how do they work?

Networks face various security threats, including malware, ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
555 views
0 votes
0 answers

What’s the role of firewalls in network security?

Firewalls act as a barrier between trusted ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
544 views
0 votes
1 answer

What is the difference between hashing and masking?

Hashing and masking are two distinct techniques ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,648 views
0 votes
0 answers

What are the best practices for access control policies?

Effective access control policies ensure that only ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
516 views
0 votes
0 answers

How does the use of hashed passwords keep data more secure?

Hashing transforms passwords into fixed-length values, making ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
511 views
0 votes
0 answers

How do you defend against DDoS attacks?

DDoS attacks overload a network or service ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
516 views
0 votes
0 answers

How is data transmission done in the OSI model?

I want to understand how data moves ...READ MORE

Feb 26, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
601 views
0 votes
0 answers

How to track deleted log files in a compromised Linux system?

After a suspected security incident, I discovered ...READ MORE

Feb 25, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
639 views
0 votes
0 answers

What happens when a packet moves through the OSI layers?

When a packet moves through the OSI ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
547 views
0 votes
1 answer

What is the difference between data flow and control flow?

In programming and systems design, control flow ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,763 views
0 votes
0 answers

What’s the purpose of network architecture layers?

I know that network communication is structured ...READ MORE

Feb 26, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
573 views
0 votes
1 answer

How to secure a WordPress site from Brute Force Attacks?

Securing your WordPress site against brute force ...READ MORE

Feb 25, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points

reshown Mar 12, 2025 by Anupam 609 views
0 votes
0 answers

How does OAuth 2.0 manage access in web applications?

OAuth 2.0 is widely used for secure ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
468 views
0 votes
0 answers

How do RBAC and ABAC models regulate access control?

Role-Based Access Control (RBAC) and Attribute-Based Access ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
467 views
0 votes
0 answers

When should you use TCP over UDP for network communication?

TCP and UDP have different strengths based ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
517 views
0 votes
0 answers

How does a computer network enable communication between devices?

I am trying to understand how data ...READ MORE

Feb 26, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
558 views
0 votes
0 answers

Why does enabling multi-factor authentication increase your security?

Multi-factor authentication (MFA) adds an extra layer ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
462 views
0 votes
0 answers

How do you analyze buffer overflow exploits in a web server?

I am researching buffer overflow vulnerabilities in ...READ MORE

Feb 25, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
601 views
0 votes
1 answer

How can malware be hidden using NTFS Alternate Data Streams?

NTFS Alternate Data Streams (ADS) are a ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
771 views
0 votes
0 answers

jhegru ujshdfui ashdiushduiash iudhausdhyis diadh sa

snehbrjdjweh ikdiuw diukhsd iuasyd8s diasdhiasdy iasdiuasyd8iasdyuia sdyiuasydiuays ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by lkijhgf

edited Mar 5, 2025 357 views
0 votes
1 answer

How do you parse Apache access logs?

Parsing Apache access logs is essential for ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
758 views
0 votes
0 answers

What is zero-trust security in access administration?

Zero-trust security follows the principle of "never ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
433 views
0 votes
1 answer

How to automate patching web server vulnerabilities with Ansible?

Automating the patching of web server vulnerabilities ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
712 views
0 votes
1 answer

How do IoT devices know the checksum of firmware upgrades?

When Internet of Things (IoT) devices perform ...READ MORE

Feb 17, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
877 views
0 votes
0 answers

How does a client-server network differ from a peer-to-peer?

I am trying to understand the fundamental ...READ MORE

Feb 26, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
476 views
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
6,133 views
0 votes
1 answer

What are the security risks of hole punching in IoT?

NAT (Network Address Translation) hole punching is ...READ MORE

Feb 17, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
856 views
0 votes
1 answer

How to configure WAF rules for mitigating RFI attacks?

Mitigating Remote File Inclusion (RFI) attacks is ...READ MORE

Feb 19, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
761 views
0 votes
1 answer

How to prevent password cracking using salting and hashing?

To safeguard passwords against brute-force and dictionary ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
675 views
0 votes
1 answer

How to identify CORS error?

Encountering Cross-Origin Resource Sharing (CORS) errors during ...READ MORE

Feb 25, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points

edited Mar 6, 2025 496 views
0 votes
1 answer

Can apps access other apps RAM on iOS?

iOS enforces strict memory isolation between applications ...READ MORE

Feb 18, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
791 views
0 votes
1 answer

How to script a privilege escalation attack simulation in Linux?

Simulating a privilege escalation attack in Linux ...READ MORE

Feb 19, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
739 views
0 votes
0 answers

How to write a script to detect anomalous login locations?

I am trying to improve security monitoring ...READ MORE

Feb 26, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
454 views
0 votes
0 answers

How to secure cookie attributes against session hijacking?

I am working on securing user sessions ...READ MORE

Feb 25, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
452 views
0 votes
1 answer

How can DNS poisoning be used to compromise web applications?

DNS poisoning, also known as DNS spoofing ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points

edited Mar 6, 2025 609 views
0 votes
1 answer

How can you automate patch management with PowerShell?

Automating patch management across multiple Windows machines ...READ MORE

Feb 18, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
729 views
0 votes
1 answer

Can there be multiple private keys for one public key?

In traditional public-key cryptography systems like RSA ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,132 views
0 votes
0 answers

How to automate malware scanning on a web server using ClamAV?

I want to automatically scan my web ...READ MORE

Feb 26, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
418 views
0 votes
1 answer

How can you exploit file upload vulnerabilities in PHP apps?

File upload vulnerabilities in PHP applications pose ...READ MORE

Feb 19, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
671 views
0 votes
1 answer

How to analyze malicious web shell uploads in a web server?

Analyzing potential web shell uploads on a ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
580 views
0 votes
1 answer

How to write a script to check for insecure HTTP headers?

Ensuring the security of your web application ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
565 views
0 votes
1 answer

How do you detect SQL injection attacks?

Detecting SQL injection (SQLi) attacks is crucial ...READ MORE

Feb 18, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
695 views
0 votes
1 answer

How to use Burp Suite to analyze a web application attack?

Burp Suite is a comprehensive platform for ...READ MORE

Feb 18, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
695 views
0 votes
1 answer

What is the most common vulnerability associated with IoT devices?

The Internet of Things (IoT) has revolutionized ...READ MORE

Feb 17, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
732 views
0 votes
1 answer

How secure is the hashing/salting/stretching process as described in this diagram?

When storing passwords securely, employing a combination ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,091 views
0 votes
1 answer

How do so many vulnerable IoT devices stay alive and online?

The persistence of vulnerable Internet of Things ...READ MORE

Feb 17, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
688 views
0 votes
1 answer

Is there any reason not to salt and hash before using bcrypt?

When implementing password hashing with bcrypt, it's ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,023 views
0 votes
0 answers

How can a CSRF vulnerability be exploited in an insecure app?

I am testing a web application for ...READ MORE

Feb 25, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
380 views
0 votes
1 answer

How do I find unused service accounts in Active Directory?

Identifying and managing unused service accounts in ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
955 views
0 votes
1 answer

Is Safari a safe browser for iPhone?

Safari on iPhone is designed with a ...READ MORE

Feb 18, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
612 views