Tools
Types of Attacks
Acronyms
Linux Commands
Here for the company (and free snacks)
100

This tool allows access to common web protocols such as HTTP, HTTPS, or FTP over the command line

What is "wget"

100

This attack involves using large numbers of devices to overwhelm resources and prevent them from serving legitimate devices

What is a DDoS attack

100

CIA (Triad)

What is Confidentiality, Integrity, and Authenticity

100

This command lists the contents of a directory

What is "ls"

100

This fashion icon is formally named as Barbara Millicent Roberts, but is nicknamed something else...

Who is Barbie?

200
This device impersonates wifi networks so users will connect with them, and then spies on the data that goes through them

What is a pineapple/rouge access point

200

This type of attack involves sending emails with the goal of extracting information from a target or causing an exploit

What is Phishing
200

NIST

What is National Institute of Standards and Technology

200

This command will send ICMP packets to another IP address and listen for a response

What is "ping"

200

The original wearable blanket with sleeves

What is the snuggie?

300
This type of tool takes a hash with an unknown value and compares it to large lists of hashes based on a wordlist

What is a password cracker

300

This attack encrypts and prevents access to certain resources and only releases them once the attacker has been given money

What is Ransomware

300

APT

What is an Advanced Persistent Threat

300

Running this command deletes files from your system, but beware if you run it with the wrong flags you can even delete your whole system :0

What is "rm"

300

This rebel was a 1950's actor known for Rebel Without a Cause, East of Eden, and Giant; and also ironically, the engine from his car.

Who is James Dean?

400

This tool is used to scan networks for devices and services, it is one of the most common network scanning tools and is even featured in several movies during hacking scenes such as the Matrix Reloaded, Oceans 8, and Die Hard 4.

What is NMAP

400

This attack takes advantage of un-sanitized inputs in order to run code on other devices often with elevated permissions, most commonly used on databases

What is code injection/sql injection

400

SIEM

What is a Security Information and Event Manager

400

This command will compile the program that has been passed into it, it works with many compiled languages such as C, Fortran, Go, and Rust

What is "gcc"

400

This landmark is a sight to see and grows up to six inches taller during the summer!

What is the Eiffel Tower?

500

This tool is used to automatically run several common exploits on a device with little user input

What is Metasploit

500

This attack happens after an attacker has gained access to a device The attacker uses the device to mine cryptocurrency in the background while the user does not notice an issue

What is Cryptojacking

500

PCI-DSS

What is the Payment Card Industry - Data Security Standard

500

This command is used to look for specific strings inside files or outputs

What is "grep"

500

The first animal to orbit Earth was this dog in 1957

Who is Laika?

M
e
n
u