Most viewed questions in Cyber Security & Ethical Hacking

0 votes
1 answer

how to find host name from IP with out login to the host

To find host name from IP you ...READ MORE

Feb 20, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
75,062 views
+1 vote
3 answers

Not able to install arpspoof

There is no package called arpspoof. To use the arpspoof command, ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,210 points
59,684 views
0 votes
1 answer

how to find ip address in cmd

1. Open the Command Prompt.   a. Click the Start icon, ...READ MORE

Feb 9, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
46,452 views
0 votes
1 answer

How to find password of a wifi using ubuntu 18.06?

To hack a wifi password using ubuntu: You ...READ MORE

Apr 24, 2020 in Cyber Security & Ethical Hacking by Kim

edited Oct 6, 2021 by Sarfaraz 39,358 views
+1 vote
1 answer

How to run python script in PyCharm with sudo privileges?

When you run a command with sudo, by ...READ MORE

Feb 6, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,210 points
31,015 views
0 votes
1 answer

how to turn on and off kali linux on PC?

Hey, @Vatsal, "Reboot" is the correct answer. "Restart" ...READ MORE

Apr 21, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,910 points
20,807 views
+1 vote
2 answers

Error changing Mac address: SIOCSIFHWADDR: Cannot assign requested address

I can see that you are trying ...READ MORE

Feb 7, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,210 points
19,271 views
0 votes
1 answer

How can I ping my default gateway?

Using the following command you can find ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 58,090 points
17,436 views
+3 votes
3 answers
0 votes
1 answer

ARP Spoofing stops victim internet connection.

This happens if you have not enabled ...READ MORE

Jul 25, 2019 in Cyber Security & Ethical Hacking by Anis
12,595 views
0 votes
1 answer

arpspoof: libnet_init(): UID or EUID of 0 required

ARP Spoofing should be done by superusers. ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,210 points
12,386 views
0 votes
1 answer

What are common software problem that leads to network defect?

According to what I know and have faced, ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 58,090 points
8,197 views
0 votes
1 answer

How can I change IP in Android emulator

Here's the six step you need to ...READ MORE

Feb 24, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
8,012 views
0 votes
1 answer

What are the five steps of ethical hacking?

The 5 major steps involved in ethical ...READ MORE

Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 6,552 views
0 votes
1 answer

What is enumeration in ethical hacking?

Enumeration is a part of the first ...READ MORE

Feb 3, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 5,184 views
+1 vote
0 answers

How can I encryption/decryption in Rijndael using python

I found this https://github.com/moeenz/rijndael ,but does not ...READ MORE

Sep 28, 2019 in Cyber Security & Ethical Hacking by Ahmed
• 310 points
4,337 views
+1 vote
1 answer

How to find IP address of nodes in my network?

The IP address of the nodes connected ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,210 points
4,288 views
0 votes
2 answers

What programming language should I learn for cyber security?

Python is a language that is making ...READ MORE

Jul 5, 2020 in Cyber Security & Ethical Hacking by South
• 140 points

edited Oct 6, 2021 by Sarfaraz 4,073 views
0 votes
1 answer

SIOCSIFFLAGS: Operation not permitted

You need sudo permissions to make changes to ...READ MORE

Feb 6, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,210 points
3,845 views
+3 votes
1 answer

How to send the phishing link to friend?

The Social Engineer Toolkit (SET) is a ...READ MORE

Feb 6, 2020 in Cyber Security & Ethical Hacking by anonymous
1 flag 3,527 views
0 votes
1 answer

What are the different ways to secure a computer network?

You can secure your computer network by ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 58,090 points
3,238 views
+1 vote
0 answers

best tools for termux non rooted device

i want to know tools and steps ...READ MORE

Aug 1, 2019 in Cyber Security & Ethical Hacking by Sachin
3,212 views
0 votes
2 answers

what are the requirements for ethical hacking?

First, we try to know what is ...READ MORE

Mar 21, 2020 in Cyber Security & Ethical Hacking by ronny
• 140 points
3,102 views
+1 vote
1 answer

Not able to use nmap in python.

nmap module doesn’t have PortScanner attribute. The ...READ MORE

Jan 28, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,210 points
2,857 views
0 votes
1 answer

Private IP Address Identifier in Regular Expression

I'm assuming you want to match these ...READ MORE

Feb 16, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
2,594 views
0 votes
2 answers

How to manage network using a router?

Security and data logging.. Simple READ MORE

Dec 20, 2020 in Cyber Security & Ethical Hacking by Pavan Billore
2,574 views
0 votes
2 answers

I am unable to get network in my kali linux.

Hey, @Pratyusha, Kali comes with networking disabled by ...READ MORE

Apr 28, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,910 points
2,571 views
0 votes
1 answer

Not able to run nikto scan on nikto-test.com

Hi, the webpage nikto-test.com doesn’t exist anymore. ...READ MORE

Apr 1, 2019 in Cyber Security & Ethical Hacking by Karan

reshown Apr 1, 2019 by Omkar 2,236 views
0 votes
1 answer

Google Apps Script fetch data from private network (vpn)

The curl command above would provide a ...READ MORE

Feb 24, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
2,174 views
0 votes
1 answer

How to check if MAC Protection is enabled for ViewState in ASP.NET application?

You can check if the ViewState is ...READ MORE

Aug 23, 2019 in Cyber Security & Ethical Hacking by Tina
2,169 views
0 votes
1 answer

How to find MAC address using IP address?

To find the MAC address, run this ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,210 points
2,042 views
0 votes
2 answers

IP Address Class C network and its gateway

The class C network has less than ...READ MORE

Feb 21, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
1,983 views
+1 vote
1 answer

Can't install arpspoof

Hi, I think you didn't enable the repositories. ...READ MORE

Oct 20, 2020 in Cyber Security & Ethical Hacking by MD
• 95,440 points
1,911 views
0 votes
1 answer

How to identify Entry points for user input in a web application?

Following are the key entry points for ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Raman
1,766 views
0 votes
2 answers

What are the commands used for DNS troubleshooting?

ipconfig /flushdns READ MORE

Jun 27, 2020 in Cyber Security & Ethical Hacking by anonymous
1,660 views
0 votes
1 answer
0 votes
1 answer

Not able to run nmap scan on router.

Might not be the actual router address. ...READ MORE

Jan 31, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,210 points
1,594 views
0 votes
1 answer

Public IP address vs Private IP address

Is it correct that mobile phones utilise ...READ MORE

Feb 24, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
1,586 views
0 votes
1 answer

BurpSuite not capturing packets

Assuming you have made all the proxy ...READ MORE

Aug 8, 2019 in Cyber Security & Ethical Hacking by Karan
1,507 views
+1 vote
1 answer

can i run localhost in virtual machines if i enabled it in windows?

Hi, @Soujanya, Windows has its "own" localhost, so you ...READ MORE

May 26, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,910 points
1,429 views
0 votes
1 answer

What programming languages should a ethical hacker know?

An Certified Ethical Hacker is a  computer expert, who specializes ...READ MORE

Feb 3, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 1,410 views
0 votes
2 answers

Why is cyber security important?

Well, Cybersecurity is important because it encompasses everything that ...READ MORE

Oct 24, 2020 in Cyber Security & Ethical Hacking by masterronny
• 180 points

edited Oct 24, 2020 by Gitika 1,388 views
0 votes
1 answer

How to configure a static IP address, netmask, gateway programmatically on Android 3.x or 4.x?

Your application will be rejected if you ...READ MORE

Nov 7, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
1,343 views
0 votes
1 answer

How to diagnose a network using loopback address?

C:\Users\priyj_kumar>ping Loopback Pinging DESKTOP-TGAB9Q5 [::1] with 32 bytes ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 58,090 points
1,331 views
0 votes
1 answer

How to attack RSA algorithm?

There are different approaches used to attack ...READ MORE

Feb 12, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,210 points
1,253 views
0 votes
2 answers

how do we define radius in cyber security

The Remote Authentication Dial-In User Service (RADIUS) ...READ MORE

Feb 3, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
1,202 views
0 votes
1 answer

What is a DNS server and how to check whether it is configured or not?

A DNS server is used to enable a machine to ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 58,090 points
1,196 views
0 votes
1 answer

DNS resolution failed: server IP address could not be found

Update the DNS This method has gained a ...READ MORE

Mar 2, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
1,168 views
0 votes
1 answer

How can I force the login to a specific ip address?

Try to access the router's default page. It's ...READ MORE

Feb 15, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
1,139 views