Most viewed questions in Cyber Security & Ethical Hacking

+1 vote
1 answer

Not able to install arpspoof

There is no package called arpspoof. To use the arpspoof command, ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,030 points
28,657 views
+1 vote
1 answer

How to run python script in PyCharm with sudo privileges?

When you run a command with sudo, by ...READ MORE

Feb 6, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,030 points
8,540 views
0 votes
2 answers

Error changing Mac address: SIOCSIFHWADDR: Cannot assign requested address

I can see that you are trying ...READ MORE

Feb 6, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,030 points
4,469 views
0 votes
3 answers
0 votes
1 answer

ARP Spoofing stops victim internet connection.

This happens if you have not enabled ...READ MORE

Jul 25, 2019 in Cyber Security & Ethical Hacking by Anis
3,208 views
0 votes
1 answer

What are the five steps of ethical hacking?

The 5 major steps involved in ethical ...READ MORE

Jan 31 in Cyber Security & Ethical Hacking by Sirajul
• 58,210 points
2,965 views
0 votes
1 answer

What are common software problem that leads to network defect?

According to what I know and have faced, ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 57,700 points
2,692 views
0 votes
1 answer

How can I ping my default gateway?

Using the following command you can find ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 57,700 points
2,035 views
0 votes
1 answer

What is enumeration in ethical hacking?

Enumeration is a part of the first ...READ MORE

Feb 3 in Cyber Security & Ethical Hacking by Sirajul
• 58,210 points
1,962 views
0 votes
1 answer

How to find password of a wifi using ubuntu 18.06?

To hack a wifi password using ubuntu: You ...READ MORE

Apr 24 in Cyber Security & Ethical Hacking by Kim
1,877 views
0 votes
2 answers

What programming language should I learn for cyber security?

Python is a language that is making ...READ MORE

Jul 5 in Cyber Security & Ethical Hacking by South
• 140 points
1,852 views
0 votes
1 answer

how to turn on and off kali linux on PC?

Hey, @Vatsal, "Reboot" is the correct answer. "Restart" ...READ MORE

Apr 21 in Cyber Security & Ethical Hacking by Gitika
• 48,800 points
1,725 views
+1 vote
0 answers

How can I encryption/decryption in Rijndael using python

I found this https://github.com/moeenz/rijndael ,but does not ...READ MORE

Sep 28, 2019 in Cyber Security & Ethical Hacking by Ahmed
• 310 points
1,387 views
0 votes
2 answers

what are the requirements for ethical hacking?

First, we try to know what is ...READ MORE

Mar 21 in Cyber Security & Ethical Hacking by ronny
• 140 points
1,371 views
+1 vote
0 answers

best tools for termux non rooted device

i want to know tools and steps ...READ MORE

Aug 1, 2019 in Cyber Security & Ethical Hacking by Sachin
1,193 views
0 votes
1 answer

arpspoof: libnet_init(): UID or EUID of 0 required

ARP Spoofing should be done by superusers. ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,030 points
1,016 views
0 votes
1 answer

SIOCSIFFLAGS: Operation not permitted

You need sudo permissions to make changes to ...READ MORE

Feb 6, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,030 points
789 views
0 votes
1 answer

What are the different ways to secure a computer network?

You can secure your computer network by ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 57,700 points
756 views
0 votes
1 answer

How to manage network using a router?

Routers give you a built in console ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 57,700 points
732 views
+1 vote
1 answer

Can't install arpspoof

Hi, I think you didn't enable the repositories. ...READ MORE

Oct 20 in Cyber Security & Ethical Hacking by MD
• 78,830 points
728 views
+1 vote
1 answer

Not able to use nmap in python.

nmap module doesn’t have PortScanner attribute. The ...READ MORE

Jan 28, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,030 points
688 views
+3 votes
1 answer

How to send the phishing link to friend?

The Social Engineer Toolkit (SET) is a ...READ MORE

Feb 5 in Cyber Security & Ethical Hacking by anonymous
1 flag 582 views
0 votes
1 answer
0 votes
1 answer

Not able to run nmap scan on router.

Might not be the actual router address. ...READ MORE

Jan 31, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,030 points
483 views
0 votes
1 answer

How to find MAC address using IP address?

To find the MAC address, run this ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,030 points
449 views
0 votes
1 answer

What programming languages should a ethical hacker know?

An ethical hacker is a  computer expert, who specializes ...READ MORE

Feb 3 in Cyber Security & Ethical Hacking by Sirajul
• 58,210 points
412 views
0 votes
2 answers
0 votes
1 answer

BurpSuite not capturing packets

Assuming you have made all the proxy ...READ MORE

Aug 8, 2019 in Cyber Security & Ethical Hacking by Karan
377 views
0 votes
1 answer

Not able to run nikto scan on nikto-test.com

Hi, the webpage nikto-test.com doesn’t exist anymore. ...READ MORE

Apr 1, 2019 in Cyber Security & Ethical Hacking by Karan

reshown Apr 1, 2019 by Omkar 358 views
0 votes
1 answer

How to diagnose a network using loopback address?

C:\Users\priyj_kumar>ping Loopback Pinging DESKTOP-TGAB9Q5 [::1] with 32 bytes ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 57,700 points
349 views
0 votes
1 answer
0 votes
1 answer

How to identify Entry points for user input in a web application?

Following are the key entry points for ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Raman
311 views
+1 vote
1 answer

How to find IP address of nodes in my network?

The IP address of the nodes connected ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,030 points
302 views
0 votes
1 answer

Not connected to Internet

The two major problems that generally occurs ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 57,700 points
284 views
0 votes
1 answer

What is a DNS server and how to check whether it is configured or not?

A DNS server is used to enable a machine to ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 57,700 points
249 views
0 votes
1 answer

How to attack RSA algorithm?

There are different approaches used to attack ...READ MORE

Feb 12, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,030 points
234 views
0 votes
1 answer

Not able to run Nessus Scanner

You have missed out a step. After ...READ MORE

Apr 1, 2019 in Cyber Security & Ethical Hacking by Lilly
224 views
0 votes
1 answer

What are the comand used for troubleshooting DHCP issues?

The most common command used to troubleshoot ...READ MORE

Mar 22, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 57,700 points
200 views
0 votes
1 answer

Nikto scan: Handling site returning custom file not found page

This is common with complex websites. To handle ...READ MORE

Aug 21, 2019 in Cyber Security & Ethical Hacking by Krimisha
199 views
0 votes
1 answer

What degree do I need for working in the cyber security domain?

While it’s possible to find certain entry-level ...READ MORE

Jan 29 in Cyber Security & Ethical Hacking by Sirajul
• 58,210 points
198 views
0 votes
0 answers

I do not have a real result about encryption file use AES mode CFB in pycrptodome on python [closed]

I'm using Ubuntu win. on python I ...READ MORE

Aug 22, 2019 in Cyber Security & Ethical Hacking by Ahmed
• 310 points

closed Aug 22, 2019 by Ahmed 185 views
0 votes
1 answer

ARP Spoofing not capturing email and password

For ARP Spoofing to work, both victim ...READ MORE

Jul 25, 2019 in Cyber Security & Ethical Hacking by Jimmu
177 views
0 votes
1 answer

how to know the white hat hacking?

White Hat Hacking is another name for Ethical ...READ MORE

Jul 23, 2019 in Cyber Security & Ethical Hacking by Ritu
176 views
+1 vote
3 answers

How to start learning cyber security?

You can easily become a cybersecurity specialist ...READ MORE

Oct 23 in Cyber Security & Ethical Hacking by masterronny
• 180 points

edited Oct 23 by Gitika 170 views
0 votes
1 answer

Automating macchanger with Python

You can use the following code: import subprocess import ...READ MORE

Jun 24, 2019 in Cyber Security & Ethical Hacking by avantika
• 1,500 points
166 views
0 votes
1 answer

Proxychains fails at certain proxyservers

By default, proxychains uses the strict_chain option which means ...READ MORE

Jun 24, 2019 in Cyber Security & Ethical Hacking by avantika
• 1,500 points
165 views
+1 vote
1 answer

can i run localhost in virtual machines if i enabled it in windows?

Hi, @Soujanya, Windows has its "own" localhost, so you ...READ MORE

May 26 in Cyber Security & Ethical Hacking by Gitika
• 48,800 points
163 views
+1 vote
1 answer

How to become a cyber security engineer?

Cyber Security engineer is an intermediate-level position, you ...READ MORE

Jan 29 in Cyber Security & Ethical Hacking by Sirajul
• 58,210 points
163 views
0 votes
1 answer

How python is used in ethical hacking?

It is common practice amongst ethical hackers ...READ MORE

Feb 3 in Cyber Security & Ethical Hacking by anonymous
• 58,210 points
161 views