Trending questions in Cyber Security & Ethical Hacking

0 votes
0 answers

When should you use TCP over UDP for network communication?

TCP and UDP have different strengths based ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
104 views
0 votes
0 answers

How does Nmap detect open ports on a network?

Nmap is a widely used tool for ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
92 views
0 votes
0 answers

How does IP addressing work in computer networks?

IP addresses are used to identify devices ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
92 views
0 votes
0 answers

What’s the purpose of network architecture layers?

I know that network communication is structured ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
120 views
0 votes
0 answers

How to check integrity of a file in Linux?

I want to verify whether a file ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
110 views
0 votes
0 answers

What happens when a packet moves through the OSI layers?

When a packet moves through the OSI ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
68 views
0 votes
0 answers

How does a computer network enable communication between devices?

I am trying to understand how data ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
108 views
0 votes
0 answers

What’s the difference between LAN, WAN, and MAN?

I often hear about LAN (Local Area ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
102 views
0 votes
0 answers

How is data transmission done in the OSI model?

I want to understand how data moves ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
90 views
0 votes
0 answers

How to track deleted log files in a compromised Linux system?

After a suspected security incident, I discovered ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
119 views
0 votes
0 answers

How does a client-server network differ from a peer-to-peer?

I am trying to understand the fundamental ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
74 views
0 votes
1 answer

How can session hijacking be detected in HTTP traffic?

Detecting session hijacking in HTTP traffic is ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points

edited Mar 6 114 views
0 votes
0 answers

How do you analyze buffer overflow exploits in a web server?

I am researching buffer overflow vulnerabilities in ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
109 views
0 votes
0 answers

How to write a script to detect anomalous login locations?

I am trying to improve security monitoring ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
98 views
0 votes
0 answers

How to identify privilege escalation attempts in Linux logs?

I need to monitor Linux logs for ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
101 views
0 votes
1 answer

How to secure a WordPress site from Brute Force Attacks?

Securing your WordPress site against brute force ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points

reshown Mar 12 by Anupam 98 views
0 votes
1 answer

How to identify CORS error?

Encountering Cross-Origin Resource Sharing (CORS) errors during ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points

edited Mar 6 97 views
0 votes
1 answer

How to automate vulnerability scanning using OpenVAS?

Automating vulnerability scanning with OpenVAS enhances your ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
334 views
0 votes
1 answer

How do you detect log tampering in a compromised system?

Ensuring the integrity of system logs is ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
249 views
0 votes
0 answers

How to secure cookie attributes against session hijacking?

I am working on securing user sessions ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
71 views
0 votes
0 answers

How to automate malware scanning on a web server using ClamAV?

I want to automatically scan my web ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
57 views
0 votes
0 answers

How is data transmission done in the OSI model?

I want to understand how data moves ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
55 views
0 votes
0 answers

How can a CSRF vulnerability be exploited in an insecure app?

I am testing a web application for ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
95 views
0 votes
1 answer

How to exploit LFI to retrieve sensitive files in NGINX?

Local File Inclusion (LFI) vulnerabilities occur when ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
198 views
0 votes
1 answer

How do you automate vulnerability scoring in the CVSS system?

Automating vulnerability scoring using the Common Vulnerability ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
155 views
0 votes
1 answer

How does an attacker bypass CSP (Content Security Policy)?

Content Security Policy (CSP) is a critical ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
153 views
0 votes
1 answer

How to run a scan equivalent to nmap vulnerabilities scan?

Nmap is a versatile network scanning tool ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
150 views
0 votes
1 answer

How does an attacker escalate privileges via SUID misconfigurations?

In Unix-like operating systems, the Set User ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
150 views
0 votes
1 answer

How can DNS poisoning be used to compromise web applications?

DNS poisoning, also known as DNS spoofing ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points

edited Mar 6 144 views
0 votes
1 answer

How do I ignore hidden files in Linux?

In Linux, hidden files and directories are ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
143 views
0 votes
1 answer

How to write a Python script for XSS vulnerability detection?

Detecting Cross-Site Scripting (XSS) vulnerabilities is crucial ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
226 views
0 votes
1 answer

How to write a script to check for insecure HTTP headers?

Ensuring the security of your web application ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
133 views
0 votes
1 answer

How to analyze malicious web shell uploads in a web server?

Analyzing potential web shell uploads on a ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
129 views
0 votes
1 answer

How can malware be hidden using NTFS Alternate Data Streams?

NTFS Alternate Data Streams (ADS) are a ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
121 views
0 votes
1 answer

How to automate a vulnerability assessment lifecycle in Python?

Automating a vulnerability assessment lifecycle using Python ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
204 views
0 votes
1 answer

How to use Metasploit to exploit unpatched web applications?

Metasploit is a powerful framework used in ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
118 views
0 votes
1 answer

How to automate patching web server vulnerabilities with Ansible?

Automating the patching of web server vulnerabilities ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
110 views
0 votes
1 answer

How to configure OWASP ZAP for automated vulnerability scans?

Configuring OWASP Zed Attack Proxy (ZAP) for ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
107 views
0 votes
1 answer

How do you track failed login attempts using ELK Stack?

Monitoring failed login attempts is crucial for ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
168 views
0 votes
1 answer

How to prevent password cracking using salting and hashing?

To safeguard passwords against brute-force and dictionary ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
83 views
0 votes
1 answer

How do you parse Apache access logs?

Parsing Apache access logs is essential for ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
81 views
0 votes
1 answer

How to script a privilege escalation attack simulation in Linux?

Simulating a privilege escalation attack in Linux ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
161 views
0 votes
1 answer

How to detect open ports on a web server using Python?

Conducting a security audit to identify open ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
187 views
0 votes
1 answer

How do you detect brute force login attempts in Apache logs?

Monitoring Apache web server logs is essential ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
139 views
0 votes
1 answer

What is the purpose of anti-rollback protection in IoT devices?

Anti-rollback protection is a security feature in ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
217 views
0 votes
1 answer

How can you exploit file upload vulnerabilities in PHP apps?

File upload vulnerabilities in PHP applications pose ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
109 views
0 votes
1 answer

How to configure WAF rules for mitigating RFI attacks?

Mitigating Remote File Inclusion (RFI) attacks is ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
106 views
0 votes
1 answer

How to secure a Linux web server?

Securing a Linux web server involves implementing ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
142 views
0 votes
1 answer

How do you detect SQL injection attacks?

Detecting SQL injection (SQLi) attacks is crucial ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
140 views
0 votes
1 answer

How to use Burp Suite to analyze a web application attack?

Burp Suite is a comprehensive platform for ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
119 views