The same thing as "ls" on Linux
What is "dir"?
IP
What is "internet protocol"?
The address used to identify hosts on the network layer
What is an IP address?
The number of unique colors that can be displayed with 8-bit color
What is 256?
This vulnerability, often referred to as ms17-10, exploits SMB to give the user a system-level shell
What is eternalblue?
The same thing as "journalctl" on Linux
What is event viewer?
DNS
What is "domain name system"?
The 5th layer in the OSI model
What is session?
The measurement of the rate of symbols during the communication process, an example would be 115200 in UART
What is the baudrate?
This 2014 SSL vulnerability leaked private keys
What is Heartbleed?
A command-line tool on Windows used for management
What is WMIC?
SMB
What is "server message block"?
The general name for titles like .com, .net, and .edu
What is a TLD or Top Level Domain?
Other than just a name change with "PATA" to "SATA" disks, there also came this communication change
What is Parallel to Serial communication?
This recent vulnerability extracted its code from test files and modified a popular compression library
What is the XZ backdoor?
The equivalent of /etc/shadow on Linux
What is the SAM?
CIDR
What is "classless inter-domain routing"?
This protocol is commonly found on port 995
What is POP3s?
The common device that can be used to read a firmware image from an eMMC chip
What is an SD card reader?
This attack uses the birthday paradox to extract information about the plaintext of an SSL/TLS encrypted packet
What is Sweet32?
This character allows administrators to hide SMB shares from normal users (like . in the Linux file system)
What is a $?
PHP
What is "PHP: hypertext preprocessor"?
This private IP address range uses the /12 CIDR range
What is 172.16.0.0 – 172.31.255.255?
A common 10 pin debugging interface is JTAG, but many modern devices are moving to this 3 pin debugging interface
What is SWD (Serial Wire Debug)?
This popular Windows exploit coerced the domain controller to send NTLM credentials for the attacker to relay to the active directory certificate service. Using the certificate service, the attacker could then generate a TGT for use across the domain
What is Petit Potam?