Most voted questions in Cyber Security & Ethical Hacking

+1 vote
1 answer

How do I evade detection while using a VPN during an attack?

Yes, even when we're using a VPN, ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
412 views
+1 vote
1 answer

Can a 42-year-old get into cybersecurity without an IT background?

Absolutely, you can break into the Cybersecurity ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
198 views
+1 vote
1 answer

Why is my brute-force attack on a web application failing after a few attempts?

If your brute-force attack is failing after ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
172 views
+1 vote
1 answer

How do I perform a CSRF attack to change user account settings without authorization?

A Cross-Site Request Forgery (CSRF) attack is ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
357 views
+1 vote
1 answer

Can hackers hide their info from netstat?

Yes, attackers can hide their network activity ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
251 views
+1 vote
1 answer

How do I find and exploit an insecure API endpoint in a mobile app?

In order to locate and test insecure ...READ MORE

Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
362 views
+1 vote
1 answer

How do I create a custom Metasploit payload that avoids antivirus detection?

If you're trying to create a custom ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
515 views
+1 vote
1 answer
+1 vote
1 answer

What techniques can I use in Python to analyze logs for potential security breaches?

To analyze logs for potential security breaches, ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
294 views
+1 vote
1 answer

How can I utilize Java to build a simple vulnerability scanner for web applications?

In order to build a simple vulnerability ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
290 views
+1 vote
1 answer

How can I use PHP to securely handle user sessions and prevent session hijacking?

In order to securely handle user sessions ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
284 views
+1 vote
1 answer

How can I write a Ruby script to automate the process of brute-forcing a login form?

In order to create a Ruby script ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
313 views
+1 vote
1 answer

What methods can I use in JavaScript to detect and prevent clickjacking attacks?

In order to prevent clickjacking attacks, we ...READ MORE

Oct 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
398 views
+1 vote
1 answer
+1 vote
1 answer
+1 vote
1 answer

What are the best practices for securing HTML forms against XSS attacks?

In order to secure HTML forms against ...READ MORE

Oct 22, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
592 views
+1 vote
1 answer

What is the role of WHOIS data in DNS footprinting and how can I automate retrieval?

WHOIS data is essential in DNS footprinting ...READ MORE

Oct 21, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
418 views
+1 vote
1 answer

Can you show me an example of using DNS dig commands in a Python script?

You can run shell commands like dig ...READ MORE

Oct 21, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
348 views
+1 vote
1 answer

How can I conduct reverse DNS lookups efficiently using DNS footprinting methods?

Reverse DNS lookup allow users to map ...READ MORE

Oct 21, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
421 views
+1 vote
1 answer

What is the best way to use APIs for DNS footprinting in Node.js?

There are several APIs that can help ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
450 views
+1 vote
1 answer

How can I use Python for web scraping to gather information during reconnaissance?

Python is considered to be an excellent ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
327 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
382 views
+1 vote
1 answer

How does the LIMIT clause in SQL queries lead to injection attacks?

The LIMIT clause in SQL can indeed ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
540 views
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
801 views
+1 vote
1 answer

Python arpspoofing stops the victims internet connection

Here's a similar query. Check this out! https://www.edureka.co/community/53049/arp-spoofing-stops-victim-internet-connection Hope ...READ MORE

Sep 21, 2020 in Cyber Security & Ethical Hacking by Karan
• 19,610 points
1,524 views
+1 vote
1 answer

can i run localhost in virtual machines if i enabled it in windows?

Hi, @Soujanya, Windows has its "own" localhost, so you ...READ MORE

May 26, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,770 points
1,865 views
+1 vote
1 answer

When i am installing setoolkit this error is appear?

Looks like a permission issue. Try executing ...READ MORE

Apr 6, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points
1,244 views
+1 vote
1 answer

How to get into ethical hacking?

How to become an ethical hacker very much ...READ MORE

Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 1,105 views
+1 vote
1 answer

How to learn ethical hacking?

Ethical Hacking is a really interesting field ...READ MORE

Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 1,001 views
+1 vote
3 answers

How to start learning cyber security?

You can easily become a cybersecurity specialist ...READ MORE

Oct 24, 2020 in Cyber Security & Ethical Hacking by masterronny
• 180 points

edited Oct 24, 2020 by Gitika 1,640 views
+1 vote
2 answers

How to become a cyber security engineer?

Security engineers typically start their career paths ...READ MORE

Dec 14, 2021 in Cyber Security & Ethical Hacking by Error
• 420 points
1,729 views
+1 vote
1 answer

How much does a cyber security engineer make or earn?

Cybersecurity job market is fast-growing and the ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 1,290 views
+1 vote
1 answer

How to learn cyber security?

Ethical Hacking has been a lucrative career ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 941 views
+1 vote
1 answer

How to get into cyber security domain?

The number of cyber-crimes is on an ...READ MORE

Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 977 views
+1 vote
1 answer

Can't install arpspoof

Hi, I think you didn't enable the repositories. ...READ MORE

Oct 20, 2020 in Cyber Security & Ethical Hacking by MD
• 95,460 points
2,420 views
+1 vote
0 answers

How can I encryption/decryption in Rijndael using python

I found this https://github.com/moeenz/rijndael ,but does not ...READ MORE

Sep 28, 2019 in Cyber Security & Ethical Hacking by Ahmed
• 310 points
5,420 views
+1 vote
0 answers

best tools for termux non rooted device

i want to know tools and steps ...READ MORE

Aug 1, 2019 in Cyber Security & Ethical Hacking by Sachin
3,921 views
+1 vote
1 answer

How to find IP address of nodes in my network?

The IP address of the nodes connected ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,220 points
5,249 views
+1 vote
3 answers

Not able to install arpspoof

There is no package called arpspoof. To use the arpspoof command, ...READ MORE

Feb 9, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,220 points
64,128 views
+1 vote
2 answers

Error changing Mac address: SIOCSIFHWADDR: Cannot assign requested address

I can see that you are trying ...READ MORE

Feb 7, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,220 points
21,969 views
+1 vote
1 answer

How to run python script in PyCharm with sudo privileges?

When you run a command with sudo, by ...READ MORE

Feb 6, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,220 points
35,098 views
+1 vote
1 answer

Not able to use nmap in python.

nmap module doesn’t have PortScanner attribute. The ...READ MORE

Jan 28, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,220 points
3,817 views
0 votes
1 answer

What is Active Directory AS-REP roasting, and how is it exploited?

Understanding AS-REP Roasting and Its Exploitation Overview AS-REP Roasting ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
41 views
0 votes
1 answer

How can attackers enumerate Azure AD users?

Understanding Azure AD User Enumeration Techniques Attackers often ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
42 views
0 votes
1 answer

How does passive DNS monitoring help in enumeration?

Passive DNS (pDNS) monitoring is a valuable ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
45 views
0 votes
1 answer

How does fuzzy matching help in OS detection?

​Fuzzy matching plays a pivotal role in ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
46 views
0 votes
1 answer

What is the difference between PTR and A record enumeration?

​A (Address) records and PTR (Pointer) records ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
49 views
0 votes
1 answer

How can response time analysis reveal an OS fingerprint?

​Response time analysis is a technique used ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
32 views
0 votes
1 answer

What is PTR record scanning, and how does it work?

​PTR (Pointer) record scanning is a technique ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
38 views