Cybersecurity Basics
Cyber Threats
Linux Commands
File System & Permissions
OverTheWire Bandit
100

What does cybersecurity protect?

  • Computers, networks, data, and systems from digital threats

100

What is phishing?

Fake messages or websites that trick people into revealing information

100

What command shows your current directory?

pwd

100

What does /home/username contain?

A user’s personal files and folders

100

What tool is used to connect to the Bandit server?

ssh

200

What is ethical hacking?

Hacking to help organizations fix security flaws (not to harm)

200

What does malware do?

Damages or spies on your system

200

What command lists all files (including hidden)?

ls -a

200

What does the ‘r’ permission allow?

Reading the file

200

How do you start Level 0 of Bandit?

ssh bandit0@bandit.labs.overthewire.org -p 2220

300

What does “CTF” stand for?

Capture the Flag

300

What is a brute-force attack?  

Repeatedly guessing passwords until one works

300

What command reads a file’s content?

cat

300

What does chmod 600 secret.txt do?

Only the owner can read/write (no one else can access)


300

How do you read a file named -?

cat ./-

400

Why is cybersecurity important?

Because we rely on technology (school, banking, etc.)

400

What is ransomware?

Malware that locks files and demands payment

400

What command changes directories?

cd

400

What does “.” mean in a path or command?

The current directory

400

What symbol is used to redirect input/output?

> or <

500

What does the CIA triad stand for?

Confidentiality, Integrity, Availability

500

What is a misconfigured system?

A system set up incorrectly, making it vulnerable

500

What command tells you the file type?

file

500

What command searches for files by name?

find . -name "filename"


500

How to find a human-readable file in Level 4?

Use file command

M
e
n
u