Most answered questions in Cyber Security & Ethical Hacking

0 votes
2 answers

Error changing Mac address: SIOCSIFHWADDR: Cannot assign requested address

bro first byte must be even. you ...READ MORE

Jul 18 in Cyber Security & Ethical Hacking by code_coder__
351 views
0 votes
1 answer
0 votes
1 answer

When should I prefer Client-side validation checks over Server-side validation checks?

Client-side validation checks are preferred to reduce ...READ MORE

Aug 23 in Cyber Security & Ethical Hacking by Steven
17 views
0 votes
1 answer

Disabling browser Javascript breaks application

This usually happens if the javascript contains ...READ MORE

Aug 23 in Cyber Security & Ethical Hacking by Kunal
12 views
0 votes
1 answer

Handling MAC protected ViewState

You can use BurpSuite for this. When ...READ MORE

Aug 23 in Cyber Security & Ethical Hacking by Juna
12 views
0 votes
1 answer
0 votes
1 answer

How does Burpsuite help modify browser requests?

While using Burpsuite, you have to use ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Jishan
21 views
0 votes
1 answer

How to modify hidden content in a web page?

You can save the source code as ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Emilia
16 views
0 votes
1 answer

How to modify indirectly visible data sent to client by user?

Yes, it is possible to modify this ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Jimmy
18 views
0 votes
1 answer
0 votes
1 answer

Is it possible to find technolgy name of a web application using session tokens?

If the web application uses web servers that ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Kumar
13 views
0 votes
1 answer
0 votes
1 answer
0 votes
1 answer

Out-of-band channels for entry points in web application hacking

The out-of-band channels for entry depends on ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Daniel
17 views
0 votes
1 answer

Nonstandard query string markers and field separators in a web application

You should definitely consider them as entry ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Likith
10 views
0 votes
1 answer

How to identify Entry points for user input in a web application?

Following are the key entry points for ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Raman
29 views
0 votes
1 answer

Nikto scan: Handling site returning custom file not found page

This is common with complex websites. To handle ...READ MORE

Aug 21 in Cyber Security & Ethical Hacking by Krimisha
12 views
0 votes
1 answer

BurpSuite Spidering: How does new content get discovered?

Actually, it does both. First, it bruteforces ...READ MORE

Aug 21 in Cyber Security & Ethical Hacking by Tina
12 views
0 votes
1 answer

BurpSuite captures only 1 request

If you want to see all the ...READ MORE

Aug 8 in Cyber Security & Ethical Hacking by Jishan
21 views
0 votes
1 answer

BurpSuite not capturing packets

Assuming you have made all the proxy ...READ MORE

Aug 8 in Cyber Security & Ethical Hacking by Karan
27 views
0 votes
1 answer

ARP Spoofing not capturing email and password

For ARP Spoofing to work, both victim ...READ MORE

Jul 25 in Cyber Security & Ethical Hacking by Jimmu
27 views
0 votes
1 answer

ARP Spoofing stops victim internet connection.

This happens if you have not enabled ...READ MORE

Jul 25 in Cyber Security & Ethical Hacking by Anis
117 views
0 votes
1 answer

how to know the white hat hacking?

White Hat Hacking is another name for Ethical ...READ MORE

Jul 23 in Cyber Security & Ethical Hacking by Ritu
31 views
0 votes
1 answer

Automating macchanger with Python

You can use the following code: import subprocess import ...READ MORE

Jun 24 in Cyber Security & Ethical Hacking by Avantika
• 1,500 points
56 views
0 votes
1 answer

Proxychains fails at certain proxyservers

By default, proxychains uses the strict_chain option which means ...READ MORE

Jun 24 in Cyber Security & Ethical Hacking by Avantika
• 1,500 points
39 views
0 votes
1 answer

What is port forwarding??

Hey there! Port forwarding is a technique of ...READ MORE

May 27 in Cyber Security & Ethical Hacking by Omkar
• 67,620 points
48 views
0 votes
1 answer

dns2tcp: Connection to remote ssl-tunnel

This command will create a line-based connection: $ ...READ MORE

May 21 in Cyber Security & Ethical Hacking by Rajan
33 views
0 votes
1 answer

dns2tcp: Get all available connections

You can get the list of available ...READ MORE

May 21 in Cyber Security & Ethical Hacking by Jishan
34 views
0 votes
1 answer

Not able to run Nessus Scanner

You have missed out a step. After ...READ MORE

Apr 1 in Cyber Security & Ethical Hacking by Lilly
42 views
0 votes
1 answer

Not able to run nikto scan on nikto-test.com

Hi, the webpage nikto-test.com doesn’t exist anymore. ...READ MORE

Apr 1 in Cyber Security & Ethical Hacking by Karan

reshown Apr 1 by Omkar 49 views
0 votes
1 answer

What are the commands used for DNS troubleshooting?

The command that is used to troubleshoot ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,900 points
55 views
0 votes
1 answer

What are the comand used for troubleshooting DHCP issues?

The most common command used to troubleshoot ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,900 points
43 views
0 votes
1 answer

How to diagnose a network using loopback address?

C:\Users\priyj_kumar>ping Loopback Pinging DESKTOP-TGAB9Q5 [::1] with 32 bytes ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,900 points
61 views
0 votes
1 answer

What are common software problem that leads to network defect?

According to what I know and have faced, ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,900 points
120 views
0 votes
1 answer

How to manage network using a router?

Routers give you a built in console ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,900 points
84 views
0 votes
1 answer

What are the different ways to secure a computer network?

You can secure your computer network by ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,900 points
73 views
0 votes
1 answer

How to quickly troubleshoot my network?

The best way to troubleshoot your network ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,900 points
40 views
0 votes
1 answer

What is a DNS server and how to check whether it is configured or not?

A DNS server is used to enable a machine to ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,900 points
42 views
0 votes
1 answer

How can I ping my default gateway?

Using the following command you can find ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,900 points
72 views
0 votes
1 answer

Not connected to Internet

The two major problems that generally occurs ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,900 points
35 views
0 votes
1 answer

How to attack RSA algorithm?

There are different approaches used to attack ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by Omkar
• 67,620 points
60 views
0 votes
1 answer

arpspoof: libnet_init(): UID or EUID of 0 required

ARP Spoofing should be done by superusers. ...READ MORE

Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 67,620 points
125 views
0 votes
1 answer

How to find MAC address using IP address?

To find the MAC address, run this ...READ MORE

Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 67,620 points
80 views
0 votes
1 answer

How to find IP address of nodes in my network?

The IP address of the nodes connected ...READ MORE

Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 67,620 points
52 views
0 votes
1 answer

Not able to install arpspoof

There is no package called arpspoof. To use the arpspoof command, ...READ MORE

Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 67,620 points
641 views
0 votes
1 answer

How to run python script in PyCharm with sudo privileges?

When you run a command with sudo, by ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Omkar
• 67,620 points
1,439 views
0 votes
1 answer

SIOCSIFFLAGS: Operation not permitted

You need sudo permissions to make changes to ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Omkar
• 67,620 points
181 views
0 votes
1 answer

Not able to run nmap scan on router.

Might not be the actual router address. ...READ MORE

Jan 31 in Cyber Security & Ethical Hacking by Omkar
• 67,620 points
82 views
0 votes
1 answer

Not able to use nmap in python.

nmap module doesn’t have PortScanner attribute. The ...READ MORE

Jan 28 in Cyber Security & Ethical Hacking by Omkar
• 67,620 points
72 views
+1 vote
0 answers

How can I encryption/decryption in Rijndael using python

I found this https://github.com/moeenz/rijndael ,but does not ...READ MORE

Sep 28 in Cyber Security & Ethical Hacking by Ahmed
• 310 points
42 views