The concept of using relationships, persuasion, and body language to steal private information or convince someone to do something
Social engineering
What do you call a piece of malware that's part of a larger family that attaches onto code
Virus
What command moves folders?
mv
Piece of code that destroys data if certain conditions are met
Logic Bomb
Which key allows you to decrypt the encrypted data?
Private Key
Exploiting real components to compromise a security protocol/measure
Physical Attack
Worm
What's this called " - " (commonly used with a capital letter)
flag
A worm that broke into an Iranian nuclear centrifuge
Stuxnet
Specific data you can find from a file, email, or a photo
Metadata
malicious flood of internet traffic towards a specific user
Denial of Service (DOS)
type of malware that listens and records the user's keystrokes
Keylogger
What command lets you create/merge files
cat
What would happen if you set your old iPhone to Jan 1, 1970
overflow of integers would brick the phone
Way of encryption by hiding data in pictures
Steganography
Attacker owns a malicious version of a commonly-used website, so when the user mistypes and goes to their website instead.
Watering hole/typo-squatting
type of malware that utilizes programs and credentials that are authorized to operate with higher perms
Trojan
What command allows you to use commands you usually wouldn't without admin powers
The name of an Android trojan that stole credentials and SMS messages from users, bypassing Google Store Play protections by being downloaded externally.
TeaBot
making something simple and making it unclear to read
Obfuscation
Command Injection
Type of malware that gives administrative access to a computer with a set of tools whilst unknown
Rootkit
Which command opens a text file
nano
A Russian gang that is notorious for using high-pressure tactics like ransomware to extort victims.
REvil
process of removing and destroying data by overwriting data multiple times
Data Sanitization