What does cybersecurity protect?
Computers, networks, data, and systems from digital threats
What is phishing?
Fake messages or websites that trick people into revealing information
What command shows your current directory?
pwd
What does /home/username contain?
A user’s personal files and folders
What tool is used to connect to the Bandit server?
ssh
What is ethical hacking?
Hacking to help organizations fix security flaws (not to harm)
What does malware do?
Damages or spies on your system
What command lists all files (including hidden)?
ls -a
What does the ‘r’ permission allow?
Reading the file
How do you start Level 0 of Bandit?
ssh bandit0@bandit.labs.overthewire.org -p 2220
What does “CTF” stand for?
Capture the Flag
What is a brute-force attack?
Repeatedly guessing passwords until one works
What command reads a file’s content?
cat
What does chmod 600 secret.txt do?
Only the owner can read/write (no one else can access)
How do you read a file named -?
cat ./-
Why is cybersecurity important?
Because we rely on technology (school, banking, etc.)
What is ransomware?
Malware that locks files and demands payment
What command changes directories?
cd
What does “.” mean in a path or command?
The current directory
What symbol is used to redirect input/output?
> or <
What does the CIA triad stand for?
Confidentiality, Integrity, Availability
What is a misconfigured system?
A system set up incorrectly, making it vulnerable
What command tells you the file type?
file
What command searches for files by name?
find . -name "filename"
How to find a human-readable file in Level 4?
Use file command