Trending questions in Cyber Security & Ethical Hacking

0 votes
1 answer

how to find host name from IP with out login to the host

To find host name from IP you ...READ MORE

Feb 20, 2022 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points
88,131 views
0 votes
1 answer

how to find ip address in cmd

1. Open the Command Prompt.   a. Click the Start icon, ...READ MORE

Feb 9, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
47,567 views
0 votes
0 answers

Is unauthenticated access to electricity meter readings a vulnerability?

If an electricity meter’s readings can be ...READ MORE

10 hours ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
5 views
0 votes
0 answers

How can I determine if there is a session hijacking vulnerability?

What techniques or tools can I use ...READ MORE

10 hours ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
4 views
0 votes
0 answers

Are vulnerabilities in transitive dependencies exploitable?

If a transitive dependency in my application ...READ MORE

10 hours ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
3 views
0 votes
0 answers

What steps can be taken to prevent directory enumeration attacks (e.g., DirB or Directory Buster)?

Directory enumeration tools like DirBuster can expose ...READ MORE

10 hours ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
3 views
0 votes
0 answers

How can API method parameter enumeration be performed via a web browser?

What are the steps to manually enumerate ...READ MORE

10 hours ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
2 views
0 votes
0 answers

What is the best way to prevent user enumeration when updating email addresses?

In scenarios where users can change their ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
8 views
0 votes
0 answers

What is the purpose of subdomain enumeration?

Subdomain enumeration is a common step in ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
7 views
0 votes
0 answers

Why do some bug bounties ignore user enumeration vulnerabilities?

I’ve noticed that some bug bounty programs ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
7 views
0 votes
0 answers

What is the best way to test for username enumeration risks?

I’m trying to identify username enumeration vulnerabilities ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
7 views
0 votes
0 answers

Is CAPTCHA sufficient to prevent user enumeration?

Many sites implement CAPTCHAs to deter bots. ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
7 views
0 votes
0 answers

How can user enumeration be prevented on a registration page?

On my app's registration page, attackers might ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
18 views
0 votes
0 answers

How can user enumeration be a threat when creating accounts on platforms like Google?

When signing up on platforms like Google, ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
15 views
0 votes
0 answers

What risks are associated with account enumeration during verification-less signups?

I’m building a system that allows users ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
14 views
0 votes
0 answers

How can client-side encryption be applied for a user with multiple devices?

I’m working on an app that encrypts ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
14 views
0 votes
0 answers

How can I understand secure multi-party circuits for stable matching?

I’m trying to learn about secure multi-party ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
14 views
0 votes
1 answer
0 votes
0 answers

What is the Randstorm vulnerability?

The Randstorm vulnerability exposes flaws in random ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
27 views
0 votes
0 answers

What is the difference between TEE and HSM in Android Pie?

Trusted Execution Environments (TEE) and Hardware Security ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
23 views
0 votes
1 answer

How can asymmetric encryption be applied to user data to allow unauthenticated input?

Asymmetric encryption can be effectively applied to ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
26 views
0 votes
1 answer

How can I get a 12-byte authentication tag in AES-GCM?

To generate a 12-byte (96-bit) authentication tag ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
20 views
0 votes
1 answer

Are API encryption key vault services truly secure?

API encryption key vault services can be ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
20 views
0 votes
0 answers

For LUKS, how many iterations are sufficient to ensure security?

The number of iterations in LUKS (Linux ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
16 views
0 votes
1 answer

Can ML-KEM be used for purposes other than exchanging AES-GCM keys?

Yes, ML-KEM (Message-Locked Key Encapsulation Mechanism) can ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
19 views
0 votes
0 answers

How does JWE secure the Content Encryption Key?

JSON Web Encryption (JWE) ensures the confidentiality ...READ MORE

5 days ago in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
15 views
0 votes
1 answer

Do integrity and authentication always go hand-in-hand, and why?

Integrity and authentication often go hand-in-hand, but ...READ MORE

6 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
17 views
0 votes
1 answer

How does a Key Distribution Center (KDC) distribute the session key in symmetric encryption?

A Key Distribution Center (KDC) securely distributes ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
30 views
0 votes
1 answer

How can I pass user identity to a different REST service?

To securely pass user identity between REST ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
28 views
0 votes
1 answer
0 votes
1 answer

What are the best practices for cryptography in this scenario?

Here are the Top 5 Best Practices ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
27 views
0 votes
1 answer

How can I explain to non-tech friends why "cryptography is good"?

Using relevant examples and highlighting its daily ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
25 views
0 votes
1 answer

What encryption and decryption algorithms are used in GSM?

GSM (Global System for Mobile Communications) uses ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
28 views
0 votes
1 answer

Are encryption algorithms designed to hinder parallelization, and if so, why?

Encryption algorithms are often designed to resist ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
16 views
0 votes
1 answer

In Veracrypt, which encryption algorithm and hash algorithm should I use?

Choosing the right encryption and hash algorithms ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
15 views
0 votes
1 answer

How can passwords be stored in a database so they can be securely retrieved?

Here's a step-by-step approach for securely storing ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
13 views
0 votes
1 answer

Is there a tool for public key cryptography where the password acts as the private key?

Yes, there are cryptographic tools that allow ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
13 views
0 votes
1 answer

What cellular encryption algorithms are currently in use globally?

Overview of Cellular Network Encryption Cellular networks employ ...READ MORE

Dec 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
25 views
0 votes
1 answer

Why are there so many different encryption algorithms?

The diversity of encryption algorithms exists because ...READ MORE

Dec 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
22 views
0 votes
1 answer

Which encryption algorithms are suitable for different content types?

Yes, the type of content (text, video, ...READ MORE

Dec 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
21 views
0 votes
1 answer

Is it beneficial to double up or cycle encryption algorithms, and how does it work?

Doubling up or cycling encryption techniques involves using ...READ MORE

Dec 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
18 views
0 votes
1 answer

Are there copyright issues with encryption algorithms?

The legal aspects of encryption algorithms, such ...READ MORE

Dec 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
16 views
0 votes
1 answer

What are the current encryption algorithms?

Here's a list of current encryption algorithms, categorized ...READ MORE

Nov 29 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
26 views
0 votes
1 answer

How to check if someone is remotely accessing your computer?

Here's a step-by-step guide to help you ...READ MORE

Nov 29 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
26 views
0 votes
1 answer

How many businesses experienced a Spectre/Meltdown attack?

Even though there aren't exact numbers on ...READ MORE

Nov 29 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
25 views
0 votes
1 answer

How to clear router history?

The process of clearing your router's history ...READ MORE

Nov 29 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
21 views
0 votes
0 answers

What are some examples of asymmetric encryption algorithms?

I’m studying encryption methods and want to ...READ MORE

Nov 29 in Cyber Security & Ethical Hacking by Anupam
• 6,030 points
28 views
0 votes
1 answer

How to turn off the camera light on a laptop?

Here are general steps and specific instructions ...READ MORE

Nov 28 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
27 views
0 votes
1 answer

How to send an email anonymously?

Here is a guide on how to ...READ MORE

Nov 28 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
26 views
0 votes
1 answer

How to know a Windows password?

While losing access to your Windows account ...READ MORE

Nov 28 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 8,660 points
25 views