Most viewed questions in Cyber Security & Ethical Hacking

0 votes
1 answer

Not able to install arpspoof

There is no package called arpspoof. To use the arpspoof command, ...READ MORE

Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 68,180 points
2,607 views
0 votes
1 answer

How to run python script in PyCharm with sudo privileges?

When you run a command with sudo, by ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Omkar
• 68,180 points
2,162 views
0 votes
2 answers

Error changing Mac address: SIOCSIFHWADDR: Cannot assign requested address

bro first byte must be even. you ...READ MORE

Jul 18 in Cyber Security & Ethical Hacking by code_coder__
532 views
0 votes
1 answer

ARP Spoofing stops victim internet connection.

This happens if you have not enabled ...READ MORE

Jul 25 in Cyber Security & Ethical Hacking by Anis
375 views
0 votes
0 answers

best tools for termux non rooted device

i want to know tools and steps ...READ MORE

Aug 1 in Cyber Security & Ethical Hacking by Sachin
299 views
0 votes
1 answer

SIOCSIFFLAGS: Operation not permitted

You need sudo permissions to make changes to ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Omkar
• 68,180 points
246 views
0 votes
1 answer

arpspoof: libnet_init(): UID or EUID of 0 required

ARP Spoofing should be done by superusers. ...READ MORE

Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 68,180 points
233 views
0 votes
1 answer

What are common software problem that leads to network defect?

According to what I know and have faced, ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,960 points
213 views
0 votes
1 answer

How to manage network using a router?

Routers give you a built in console ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,960 points
167 views
+1 vote
0 answers

How can I encryption/decryption in Rijndael using python

I found this https://github.com/moeenz/rijndael ,but does not ...READ MORE

Sep 28 in Cyber Security & Ethical Hacking by Ahmed
• 310 points
164 views
+1 vote
1 answer

Not able to use nmap in python.

nmap module doesn’t have PortScanner attribute. The ...READ MORE

Jan 28 in Cyber Security & Ethical Hacking by Omkar
• 68,180 points
117 views
0 votes
1 answer

Not able to run nmap scan on router.

Might not be the actual router address. ...READ MORE

Jan 31 in Cyber Security & Ethical Hacking by Omkar
• 68,180 points
109 views
0 votes
1 answer

How to find MAC address using IP address?

To find the MAC address, run this ...READ MORE

Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 68,180 points
97 views
0 votes
1 answer

Not able to run nikto scan on nikto-test.com

Hi, the webpage nikto-test.com doesn’t exist anymore. ...READ MORE

Apr 1 in Cyber Security & Ethical Hacking by Karan

reshown Apr 1 by Omkar 91 views
0 votes
1 answer

How can I ping my default gateway?

Using the following command you can find ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,960 points
91 views
0 votes
1 answer

What are the different ways to secure a computer network?

You can secure your computer network by ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,960 points
86 views
0 votes
1 answer

How to attack RSA algorithm?

There are different approaches used to attack ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by Omkar
• 68,180 points
82 views
0 votes
1 answer

How to diagnose a network using loopback address?

C:\Users\priyj_kumar>ping Loopback Pinging DESKTOP-TGAB9Q5 [::1] with 32 bytes ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,960 points
75 views
0 votes
1 answer

What are the commands used for DNS troubleshooting?

The command that is used to troubleshoot ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,960 points
73 views
0 votes
1 answer

Automating macchanger with Python

You can use the following code: import subprocess import ...READ MORE

Jun 24 in Cyber Security & Ethical Hacking by Avantika
• 1,500 points
71 views
0 votes
1 answer

How to find IP address of nodes in my network?

The IP address of the nodes connected ...READ MORE

Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 68,180 points
71 views
0 votes
1 answer
0 votes
1 answer

Not able to run Nessus Scanner

You have missed out a step. After ...READ MORE

Apr 1 in Cyber Security & Ethical Hacking by Lilly
66 views
0 votes
1 answer

What is a DNS server and how to check whether it is configured or not?

A DNS server is used to enable a machine to ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,960 points
66 views
0 votes
1 answer

What are the comand used for troubleshooting DHCP issues?

The most common command used to troubleshoot ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,960 points
65 views
0 votes
1 answer

What is port forwarding??

Hey there! Port forwarding is a technique of ...READ MORE

May 27 in Cyber Security & Ethical Hacking by Omkar
• 68,180 points
63 views
0 votes
1 answer

Not connected to Internet

The two major problems that generally occurs ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,960 points
60 views
0 votes
1 answer

Proxychains fails at certain proxyservers

By default, proxychains uses the strict_chain option which means ...READ MORE

Jun 24 in Cyber Security & Ethical Hacking by Avantika
• 1,500 points
59 views
0 votes
1 answer

BurpSuite not capturing packets

Assuming you have made all the proxy ...READ MORE

Aug 8 in Cyber Security & Ethical Hacking by Karan
51 views
0 votes
1 answer

How to quickly troubleshoot my network?

The best way to troubleshoot your network ...READ MORE

Mar 22 in Cyber Security & Ethical Hacking by Priyaj
• 56,960 points
50 views
0 votes
1 answer

dns2tcp: Get all available connections

You can get the list of available ...READ MORE

May 21 in Cyber Security & Ethical Hacking by Jishan
48 views
0 votes
1 answer

How to identify Entry points for user input in a web application?

Following are the key entry points for ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Raman
45 views
0 votes
1 answer

dns2tcp: Connection to remote ssl-tunnel

This command will create a line-based connection: $ ...READ MORE

May 21 in Cyber Security & Ethical Hacking by Rajan
45 views
0 votes
1 answer

how to know the white hat hacking?

White Hat Hacking is another name for Ethical ...READ MORE

Jul 23 in Cyber Security & Ethical Hacking by Ritu
43 views
0 votes
1 answer

ARP Spoofing not capturing email and password

For ARP Spoofing to work, both victim ...READ MORE

Jul 25 in Cyber Security & Ethical Hacking by Jimmu
39 views
0 votes
1 answer

BurpSuite captures only 1 request

If you want to see all the ...READ MORE

Aug 8 in Cyber Security & Ethical Hacking by Jishan
38 views
0 votes
0 answers

I do not have a real result about encryption file use AES mode CFB in pycrptodome on python [closed]

I'm using Ubuntu win. on python I ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Ahmed
• 310 points

closed Aug 22 by Ahmed 35 views
0 votes
1 answer

How does Burpsuite help modify browser requests?

While using Burpsuite, you have to use ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Jishan
34 views
0 votes
1 answer
0 votes
1 answer

When should I prefer Client-side validation checks over Server-side validation checks?

Client-side validation checks are preferred to reduce ...READ MORE

Aug 23 in Cyber Security & Ethical Hacking by Steven
32 views
0 votes
1 answer
0 votes
1 answer

How to modify hidden content in a web page?

You can save the source code as ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Emilia
31 views
0 votes
1 answer

Handling MAC protected ViewState

You can use BurpSuite for this. When ...READ MORE

Aug 23 in Cyber Security & Ethical Hacking by Juna
28 views
0 votes
1 answer

How to modify indirectly visible data sent to client by user?

Yes, it is possible to modify this ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Jimmy
26 views
0 votes
1 answer
0 votes
1 answer

Out-of-band channels for entry points in web application hacking

The out-of-band channels for entry depends on ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Daniel
26 views
0 votes
1 answer

Disabling browser Javascript breaks application

This usually happens if the javascript contains ...READ MORE

Aug 23 in Cyber Security & Ethical Hacking by Kunal
23 views
0 votes
1 answer

Nikto scan: Handling site returning custom file not found page

This is common with complex websites. To handle ...READ MORE

Aug 21 in Cyber Security & Ethical Hacking by Krimisha
23 views
0 votes
1 answer

BurpSuite Spidering: How does new content get discovered?

Actually, it does both. First, it bruteforces ...READ MORE

Aug 21 in Cyber Security & Ethical Hacking by Tina
23 views
0 votes
1 answer

Is it possible to find technolgy name of a web application using session tokens?

If the web application uses web servers that ...READ MORE

Aug 22 in Cyber Security & Ethical Hacking by Kumar
21 views