This type of firewall is generally thought of as the most common
What is Packet Filtering?
The term refers to a group of cyber actors who use a certain type of TTP to enter and stay in networks without authorization
What is an Advanced Persistant Threat (APT)?
This technology is the usual way deepfakes are created
What are generative adversarial networks or GAN?
Internet searches often done with advance string indicators can be described by this technique?
What is Google Dorking?
This browser allows you to stay anonymous while on the internet and is a favorite of hackers, criminals and journalists
What is TOR?
This type of intrusion technique can be achieved by using URL commands to take advantage of flaws in a web page
What is cross site scripting?
This open source forensic tool can do multiple types of scans on disks, USBs or Mobile Devices and is available on Windows
What is Autopsy
This place is really not out in the country and does not have animals but does have people making fake social media accounts by the thousands
What is a troll farm?
A wonderful free tool which can tell the user very specific information about a domain name
What is Whois?
This company conspired with Facebook and others to target voters in the 2016 election based on their user history
Who is Cambridge Analytics?
This nasty software can be effective to record user typing data
What is a keylogger?
This term of art refers the the entire hacking process and includes such things as persistence
What is the Cyber Kill Chain?
Phishing emails are often successful using this theme on the user, whether it be good, bad or authoritative
What is a sense of urgency?
This search engine scans the internet for connected devices and has a free trial
What is Shodan?
A common name for a fake social media account often used by OSINT professionals and hackers to gather information on a target
What is a sock puppet?
A really mean wifi attack that convinces user to login to a fake access point that looks legitimate
What is an evil twin?
This evidence preservation technique requires investigators to use tools such as FTK to accomplish
What is disk imaging?
A type of trap set for hackers by the target network leading them to fake data, corrupted links, or reverse encryption.
What is a honeypot?
This individual is the current top expert in your instructor's eyes on the subject of social engineering
Who is Chris Hadnagy?
This social media site has been banned on US Government Devices due to valid concerns of stealing user information
Who is Tik Tok?
This OS directory runs on NET commands and is a primary choice of hackers to run their own scripts
What is Windows PowerShell?
An organization funded by the US Government that keeps track of such things as Common Vulnerabiliies and Exposures, while also promoting their own version of the Cyber Kill Chain
Who is MITRE?
This law if amended could hold social media companies liable for not detecting and removing disinformation in a timely fashion
What is Section 230 of the Communications Decency Act?
A simply named webpage which is the supersite of open source intelligence tools by category
What is OSINT Framework?
This source of information can show things like where images were created, whether they were altered and what type of device created them
What is metadata?