Skip to main content

Questions tagged [hacking]

Hacking is the violation of server or network security via exploitation of weaknesses in that security.

0 votes
1 answer
804 views

I have 1 Wazuh server and 2 Windows 10 agent machines. Wazuh Manager: 10.1.0.3 Agent1: 10.0.2.2 Agent2: 10.1.0.4 All firewall rules are turned off and set to ALLOW ALL Wazuh itself is functioning as ...
daniellooartist's user avatar
0 votes
1 answer
266 views

This is the second time I have gotten an authenticator prompt in the past 3 months unprompted. After the first time, I reset my password on a mobile phone (the mobile phone is patched as far as I know)...
ListsOfArrays's user avatar
1 vote
0 answers
59 views

We have a big website on a virtual server that runs fine. We have a few hundred clients. Since a few weeks, we saw that with exactly ONE of these clients there were 404 references to hrefs like www....
Roemer's user avatar
  • 111
1 vote
1 answer
112 views

I was watching a server console for results of my own activity and was bombarded by someone trying to do GET on a long alphabetical list of files/directories. I checked lastb and found some entries ...
Sinc's user avatar
  • 111
0 votes
0 answers
24 views

My CentOS server compromised, the backdoor uploaded in /var/www/html/, I have deleted the backdoor and browsed the backdoor - to be sure it's deleted - it's surly deleted, but when I run any command ...
Dany Burgos's user avatar
-1 votes
1 answer
66 views

Can Windows powershell give me fake or altered outputs if I use common commands primarily used in powershell checking hash codes is option but they can be altered too theorically so its not that ...
Mande de su ka 's user avatar
1 vote
0 answers
106 views

Server: Ubuntu 20.04.5 LTS I was going to generate an SSL certificate as usual with certbot but suddenly it started to give a weird error: An unexpected error occurred: UnicodeDecodeError: 'utf-8' ...
Darko Romanov's user avatar
0 votes
1 answer
131 views

Recently my website was hacked and now I have around 20000 indexed links in Google that were redirected to other sites via my website. Now I have stopped all redirects but I have too many request on ...
Ahmad Eidizadeh's user avatar
0 votes
0 answers
230 views

I've been using AWS SES as an SMTP relay (Postfix + Dovecot) for years and now am facing the pausing of sending emails for the second time. We use this combination as an email server for business ...
Ljubisa Livac's user avatar
-6 votes
1 answer
157 views

I am considering to move my firewall inside Hyper-V. There will be only one Guest OS that is connected to the virtual Switch, and the guest OS is the Firewall OS. While the second adapter at the ...
prd's user avatar
  • 600
-3 votes
2 answers
2k views

So for context I have two virtual machines one is running on kali linux which is the "Hacker's" machine and the other one is running on windows 10 pro which is supposed to be the victim's ...
LuckyCoder3607's user avatar
0 votes
1 answer
425 views

So I want to make a virtual hacking lab using VirtualBox. There will be two type of machines. Attack Machine : Kali Linux Target Machine : This can be any type of OS; Ubuntu, CentOS etc. I want my ...
testyAndro's user avatar
3 votes
1 answer
968 views

What would stop them from doing so, against, say, a static website hosted using S3? Is there a good way to deny some requests such that one avoids getting billed for them? (Context: I want to host a ...
Asker's user avatar
  • 131
0 votes
1 answer
2k views

I was checking my server's web server log where I'm installing a wordpress website, and found all these requests, the site is new! Should I be worried? Is my site hacked or something? I don't ...
user3279936's user avatar
0 votes
0 answers
20 views

First of all, I might be on the total wrong place to post this, but my researches lead to here and I've found "similar" questions being asked here. But still since I lack knowledge in this ...
JVol's user avatar
  • 1

15 30 50 per page
1
2 3 4 5
33