Cyber Info

CI

Cyber Info

Join the community to ask questions about Cyber Info and get answers from other members.

Join

SQLi without spaces - CTF

Hi guys!! How are you? I’m struggling with a CTF challenge from a event in my town, and I’m stuck in a SQLi vulnerability. Until now, I figured out there is a SQLi, but I can’t understand how can I exploit it. May the experts can help me 😂😅...
No description

i got doxxed

I was in a discord server and they found out my whole full name. They were able to go on facebook and find out what fraternity I am in. I am just worried they will find out my workplace and my home address. WOrse my SSN. What do I do?

Creating a Virtual Machine Sandbox for some malware analysis.

I'm trying to create a virtual machine with oracle virtualbox using windows 10. I've downloaded both the VirtualBox and windows 10 iso file. However, I'm going to be using this virtual machine for malware testing and as of what I've researched there is quite a bit of precautions that need to be done for it not to spread to my host network. I was wondering if anyone had like an up to date 2023 video or tutorial I could follow to set this whole thing up as there is loads of tutorials but they seem...

decryption

hi is there anyone know how to decrypt the wordfile with have 8 passwords that have symbols, lowercase,uppercase and digits with a more faster way, bcos now I am using hashcat and require very long time to decrypt😭

HIPAA/Software

Was just wondering if a piece of software that is not HIPAA compliant because of an AI feature. If you were to block the application from having an outbound connection (with a firewall rule), could that then be considered HIPAA compliant? Provided BAAs and all that other stuff. I'm just wondering specifically about the control measure and it's efficacy for HIPAA compliance

is this real or scam

i got this email and btw the email display name is you have been h@cked
No description

i need help with PE

i am not successful and there is no solution for this on google. if anyone wants to try the machine send dm. this is easy-medium level...

hacked

im just going to get top the point someone told me to download a game he made and i said sure i checked for viruses and it said no viruses was on it so i opened it to my surprise it didint work and i couldn't use anything on my computer so i changed my google discord and roblox bc he was going for it people that i knew were getting blocked and my name and profile pic changed

scammed

Hi i got scammed , can someone help track the location of the person

how can i make a own vpn for safety and data not shared with any companies

how can i make a own vpn for safety and data not shared with any companies and i want to make a vpn server and vpn soft which location will be anonymous locations , america , korea , china etc locations . how to make this ? as a ethical hacker . i just want to hide from black hat hackers cuz i am a ethical hacker .

Question about Aggressive Mode with Pre-Shared Key

A friend of mine is applying for a small business loan and they had to agree to a cybersecurity audit. It's really nothing more than an external pentest from an online provider. One of the dings that came back was that they use a VPN that supports IKE, aggressive mode with a Pre-Shared key. I took a look at his setup and the results are accurate. It was a lower risk (2 out of 5) on the pentest scale, and I don't think they will make much of it, but I would like to know more about the actual...

helloI want really learn

Everyone can help me learning

My Uncertainty about Career Planning

Hello friends! I was interested in the field of cyber security. I started university this year. But now it is said that job opportunities are very difficult. Frankly, I'm not sure about my field. Can I get your opinion on this? How can I find the most suitable field for myself? I guess it will be in the IT field.

the question

For every file moved to the Recycle Bin, two new files are created in the Recycle Bin. Both files start with $R. Group of answer choices...

PCIe to 2 NVMe m.2 Adapter on non PCIe Bifurcation Motherboard

I would like to know if anyone knows of an adapter that can support 2x NVMe m.2 drives that goes into a pcie slot on a mobo that does not have PCIe Bifurcation. I have been shopping around and can't seem to find one.

Blocked Ports Still Show up on Nmap?

Btw I apologize if I sound kinda stupid, I'm not new to cyber security as a whole but I don't have much knowledge of the topic and how stuff works, but anyways; I was pen testing today and found open, vulnerable, ports on Nmap (those being 135, 139, 445, 53, 80, 443, and some other random ones), and on my Windows Defender Firewall settings I made inbound rules to block connections to those ports, but after running Nmap again, as well as "netstat -ano" the ports I thought I had closed were still in fact open (according to Nmap), and listening on cmd. Is this normal? Is there something else I need to do to ensure my ports are closed? Thanks for your understanding and your help!...

Need help

Having a brain fart trying to answer this question... any help would be great. Thank you What file, object, rodent, or binary is being transferred to this active, listening process?...
No description

cyber security

Hello I need help with my lab that says challenge on it I tried doing this and got errors so please help me with this as soon as possible pin me thank you
No description