Cyber Info

CI

Cyber Info

At Cyber Info, we strive to empower every individual with easy access to cybersecurity education

Join

XSS injection question

I’m creating a very simple website that will use ChatGPTs api. I want to display the content I get from the api in a nice looking way so I figured I could just have ChatGPT add html-tags. However I came to realize that to display what I get back I need to set the response to “safe”. I e it just runs it, this is as I’ve come to understand a risk for XSS injection. How big risk is this? I feel like there’s not very likely I’d get bad code from the api but I cannot say that for sure....

munmap_chunk() : invalid pointer error in client server code

Hello, I am doing a project on client server using socket programming in c++ using aes encryption and generating shared key using deffi hellman algo (crpto++ lib) but i am getting the following error. I have mentioned the erorr in image below … if code is needed I wld send it...
how to solve this errro? is there any problem in socket programming? bcz when i am running my encryption part its printing the values of plain and vipher text correctly until it is retures and used as input for decryption

DJVU Ransom

Hello, I am having a really big problem, yesterday my PC got hacked and all of my files have been encrypted with .oohu extensions, most of them are photos and this is why is so important. Please let me know if someone can help me, if it’s too complicated I can pay for this.I will upload a example of the file. Thank you!

Resolve /app in Flatpak's /proc/<pid/maps

Hello, guys. I really need some help here, I have asked this in so many places and have never gotten a response. Basically, on Linux there's the /proc/<pid>/maps file which displays the paths of loaded modules. Something like this 50000000-5100000 rwx- /usr/lib/libc.so. I have a program to parse that file which helps a lot in process injections and stuff. It works fine on most cases. But there is a problem with Flatpaks. They use a virtual path /app to refer to the installation path of...

virus not getting detected svchost.exe file

i have a virus on my computer, its not getting detected by Kaspersky, windows defender or virustotal. but its clearly a virus, one of the parent files of the SVChost file is virus.zip and it connects to a bunch of other ips and domains how should i go about this? deleting the file does not help, it keeps coming back. not very good at this 🙂...
No description

Hello everyone

I need access to a bot's steam account

Snort Struggles: How to detect the FTP service name?

I am muddling through learning Snort and feeling a bit daft. I'm trying to write a rule that allows me to detect the FTP service name used in a .pcap. I analyzed the .pcap with sudo snort -c local.rules -A full -l . -r ftp-png-gif.pcap I looked up some ways to find the ftp service name and I found a few like sudo snort -r snort.log.1671731339 -X -n 10 which would probably do the trick, but I'm not sure why. I get that -X has something do the preprocessor, but I'm not sure why this outputs anything with FTP, or how to find where the FTP service name is in the output....

Hi there, I am having an issue with my instagram account, its hacked. can you help with this.

Hi there, I am here to bring this into your notice that my account is hacked few days ago. i can't recover my account because the phone number and Email is changed by the hacker, And is making posts stories. And sends messages to my friends too. Can you please look into this? It will be really appreciated. Here you go with the username and link....
No description

Need some help answering this question

I have answered it but It's mostly wrong im pretty sure would just appreciate someone to help me out
No description

Idk if im wording this right.

I was wondering if someone could kinda guide or teach me a little about code stuff. Maybe just enough 2 be able 2 like build a bot on discord (Just for now and possiblyPython, or Node.js) I have always been interested in it but I have issues lol, and also another thing Im also very intrested in actual technology stuff such as Cyber career or stuff in the same family as it. I just dont know where 2 start and I guess Im sorta just asking for a guide real quick? Someone help me get on the path I n...

how to set up a proxy?

So im living here in Delhi, India and I have wifi connection in Mumbai, india how can I use that wifi router's IP address using a proxy? please give me instructions thanks...

Need help choosing what to do for my future in cybersecurity (PLEASE READ)

Im a full time college student getting my bachelors in IT and cyber , i do 40 hrs a week in college, but i saw that the highest earning cyber graduates did a year in IT help desk while they were studying, I want to do this , but my cousin tells me i wont be able too manage, I wanted to get my cert in A+ and networking+ and do IT , but now im not sure what to do , what should i do while studying in college , for my absolute best future in this industry?

Ethical Hacking Report

I want someone to look through this please and give me suggests on improvements

I wanna learn ethical hacking

Hi, i cant disclose my name because i dont want to but you can refer me as unknown. I have some knowledge in computers. Ive been using them for a long time. I've looked at many courses etc for ethical hacking and warched them all but the problem is these become outdated real quick. If anyone could provide me with free courses and resouces, it would be appreciated.

wanting to learn Cyber security

HI my name is sal, and i wanted to ask if any know someone and is a mentor on teaching me cyber security, im willing to pay, please get back to me asap

Advices on data confidentiality & treatment in Management System Tool of corporation

Management System Tool is basically covered with the documents of transactions, initiatives, and suggestions. The goal of the system is to make a transparency of actions, whereas saving the confidentiality of information. So any ideas or advices how to avoid data leak, possible risks of digital security?...

OSI Model Layers Question

So I mostly get the OSI model I understand the basics of, for isntance, FTP, HTTP, DNS, TCP/IP, etc. - but I notice that if I'm asked "what layer is *abc *in based on xyz" I'm struggling to place it accurately. I wanted to ask if anyone could recommend a resource on this specific area of the OSI model. I should be fine but I want to fill in the gap....

career question

Hello, maybe this is not the appropriate topic to ask on the server, I'm sorry in advance but I need help Hello everyone, I will need help and your opinions, I am a 3rd year university student and I want to do "cloud security" everything related to the cyber security of clouds and I have to choose Between 2 specializations: the cloud or cyber security, the 2 each have a different course, I would like you to help me choose the right course to achieve what I want to become and thank you...

About hacking

I have done all the things at own but, i am not able to figure it out to how i can gear up my skill more and more. plz help me what ,i will study to became a great ethical hacker...