Most voted questions in Cyber Security & Ethical Hacking

+1 vote
1 answer

Why is my brute-force attack on a web application failing after a few attempts?

If your brute-force attack is failing after ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
327 views
+1 vote
1 answer

How do I perform a CSRF attack to change user account settings without authorization?

A Cross-Site Request Forgery (CSRF) attack is ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
529 views
+1 vote
1 answer

Can hackers hide their info from netstat?

Yes, attackers can hide their network activity ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
462 views
+1 vote
1 answer

How do I find and exploit an insecure API endpoint in a mobile app?

In order to locate and test insecure ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
550 views
+1 vote
1 answer

How do I create a custom Metasploit payload that avoids antivirus detection?

If you're trying to create a custom ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
963 views
+1 vote
1 answer
+1 vote
1 answer

What techniques can I use in Python to analyze logs for potential security breaches?

To analyze logs for potential security breaches, ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
505 views
+1 vote
1 answer

How can I utilize Java to build a simple vulnerability scanner for web applications?

In order to build a simple vulnerability ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
518 views
+1 vote
1 answer

How can I use PHP to securely handle user sessions and prevent session hijacking?

In order to securely handle user sessions ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
495 views
+1 vote
1 answer

How can I write a Ruby script to automate the process of brute-forcing a login form?

In order to create a Ruby script ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
565 views
+1 vote
1 answer

What methods can I use in JavaScript to detect and prevent clickjacking attacks?

In order to prevent clickjacking attacks, we ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
579 views
+1 vote
1 answer
+1 vote
1 answer
+1 vote
1 answer

What are the best practices for securing HTML forms against XSS attacks?

In order to secure HTML forms against ...READ MORE

Oct 22, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
808 views
+1 vote
1 answer

What is the role of WHOIS data in DNS footprinting and how can I automate retrieval?

WHOIS data is essential in DNS footprinting ...READ MORE

Oct 21, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
651 views
+1 vote
1 answer

Can you show me an example of using DNS dig commands in a Python script?

You can run shell commands like dig ...READ MORE

Oct 21, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
594 views
+1 vote
1 answer

How can I conduct reverse DNS lookups efficiently using DNS footprinting methods?

Reverse DNS lookup allow users to map ...READ MORE

Oct 21, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
625 views
+1 vote
1 answer

What is the best way to use APIs for DNS footprinting in Node.js?

There are several APIs that can help ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
604 views
+1 vote
1 answer

How can I use Python for web scraping to gather information during reconnaissance?

Python is considered to be an excellent ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
560 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
626 views
+1 vote
1 answer

How does the LIMIT clause in SQL queries lead to injection attacks?

The LIMIT clause in SQL can indeed ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
803 views
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,716 views
+1 vote
1 answer

Python arpspoofing stops the victims internet connection

Here's a similar query. Check this out! https://www.edureka.co/community/53049/arp-spoofing-stops-victim-internet-connection Hope ...READ MORE

Sep 21, 2020 in Cyber Security & Ethical Hacking by Karan
• 19,550 points
1,672 views
+1 vote
1 answer

can i run localhost in virtual machines if i enabled it in windows?

Hi, @Soujanya, Windows has its "own" localhost, so you ...READ MORE

May 26, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,730 points
1,993 views
+1 vote
1 answer

When i am installing setoolkit this error is appear?

Looks like a permission issue. Try executing ...READ MORE

Apr 6, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,190 points
1,436 views
+1 vote
1 answer

How to get into ethical hacking?

How to become an ethical hacker very much ...READ MORE

Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,190 points

edited Oct 6, 2021 by Sarfaraz 1,266 views
+1 vote
1 answer

How to learn ethical hacking?

Ethical Hacking is a really interesting field ...READ MORE

Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,190 points

edited Oct 6, 2021 by Sarfaraz 1,146 views
+1 vote
3 answers

How to start learning cyber security?

You can easily become a cybersecurity specialist ...READ MORE

Oct 24, 2020 in Cyber Security & Ethical Hacking by masterronny
• 180 points

edited Oct 24, 2020 by Gitika 1,853 views
+1 vote
2 answers

How to become a cyber security engineer?

Security engineers typically start their career paths ...READ MORE

Dec 14, 2021 in Cyber Security & Ethical Hacking by Error
• 420 points
1,962 views
+1 vote
1 answer

How much does a cyber security engineer make or earn?

Cybersecurity job market is fast-growing and the ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,190 points

edited Oct 7, 2021 by Sarfaraz 1,448 views
+1 vote
1 answer

How to learn cyber security?

Ethical Hacking has been a lucrative career ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,190 points

edited Oct 7, 2021 by Sarfaraz 1,114 views
+1 vote
1 answer

How to get into cyber security domain?

The number of cyber-crimes is on an ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,190 points

edited Oct 7, 2021 by Sarfaraz 1,168 views
+1 vote
1 answer

Can't install arpspoof

Hi, I think you didn't enable the repositories. ...READ MORE

Oct 20, 2020 in Cyber Security & Ethical Hacking by MD
• 95,460 points
2,638 views
+1 vote
0 answers

How can I encryption/decryption in Rijndael using python

I found this https://github.com/moeenz/rijndael ,but does not ...READ MORE

Sep 28, 2019 in Cyber Security & Ethical Hacking by Ahmed
• 310 points
5,591 views
+1 vote
0 answers

best tools for termux non rooted device

i want to know tools and steps ...READ MORE

Aug 1, 2019 in Cyber Security & Ethical Hacking by Sachin
4,205 views
+1 vote
1 answer

How to find IP address of nodes in my network?

The IP address of the nodes connected ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,180 points
5,459 views
+1 vote
3 answers

Not able to install arpspoof

There is no package called arpspoof. To use the arpspoof command, ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,180 points
65,362 views
+1 vote
2 answers

Error changing Mac address: SIOCSIFHWADDR: Cannot assign requested address

I can see that you are trying ...READ MORE

Feb 7, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,180 points
22,577 views
+1 vote
1 answer

How to run python script in PyCharm with sudo privileges?

When you run a command with sudo, by ...READ MORE

Feb 6, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,180 points
35,963 views
+1 vote
1 answer

Not able to use nmap in python.

nmap module doesn’t have PortScanner attribute. The ...READ MORE

Jan 28, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,180 points
4,099 views
0 votes
0 answers

What is a birthday attack in cryptography?

What is a birthday attack in cryptography, ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
67 views
0 votes
0 answers

How does email encryption work with PGP?

How does PGP use asymmetric cryptography to ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
72 views
0 votes
0 answers

Can quantum cryptography stop man-in-the-middle attacks?

Can quantum cryptography prevent man-in-the-middle attacks by ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
72 views
0 votes
0 answers

How are ciphers used to keep information secret?

How do ciphers help keep information secret ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
64 views
0 votes
0 answers

How does BitLocker provide disk-level encryption?

How does BitLocker encrypt an entire disk ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
70 views
0 votes
0 answers

How does RSA encryption protect sensitive data?

How does RSA encryption work by using ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
58 views
0 votes
0 answers

Which cryptanalysis tools are used in penetration testing?

What cryptanalysis tools, like John the Ripper ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
107 views
0 votes
0 answers

How do ciphers work in data encryption?

How do ciphers use algorithms and encryption ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
108 views
0 votes
0 answers

Which methods can be used to handle zero-day vulnerabilities?

What strategies can be used to address ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
106 views