This tool allows access to common web protocols such as HTTP, HTTPS, or FTP over the command line
What is "wget"
This attack involves using large numbers of devices to overwhelm resources and prevent them from serving legitimate devices
What is a DDoS attack
CIA (Triad)
What is Confidentiality, Integrity, and Authenticity
This command lists the contents of a directory
What is "ls"
This fashion icon is formally named as Barbara Millicent Roberts, but is nicknamed something else...
Who is Barbie?
What is a pineapple/rouge access point
This type of attack involves sending emails with the goal of extracting information from a target or causing an exploit
NIST
What is National Institute of Standards and Technology
This command will send ICMP packets to another IP address and listen for a response
What is "ping"
The original wearable blanket with sleeves
What is the snuggie?
What is a password cracker
This attack encrypts and prevents access to certain resources and only releases them once the attacker has been given money
What is Ransomware
APT
What is an Advanced Persistent Threat
Running this command deletes files from your system, but beware if you run it with the wrong flags you can even delete your whole system :0
What is "rm"
This rebel was a 1950's actor known for Rebel Without a Cause, East of Eden, and Giant; and also ironically, the engine from his car.
Who is James Dean?
This tool is used to scan networks for devices and services, it is one of the most common network scanning tools and is even featured in several movies during hacking scenes such as the Matrix Reloaded, Oceans 8, and Die Hard 4.
What is NMAP
This attack takes advantage of un-sanitized inputs in order to run code on other devices often with elevated permissions, most commonly used on databases
What is code injection/sql injection
SIEM
What is a Security Information and Event Manager
This command will compile the program that has been passed into it, it works with many compiled languages such as C, Fortran, Go, and Rust
What is "gcc"
This landmark is a sight to see and grows up to six inches taller during the summer!
What is the Eiffel Tower?
This tool is used to automatically run several common exploits on a device with little user input
What is Metasploit
This attack happens after an attacker has gained access to a device The attacker uses the device to mine cryptocurrency in the background while the user does not notice an issue
What is Cryptojacking
PCI-DSS
What is the Payment Card Industry - Data Security Standard
This command is used to look for specific strings inside files or outputs
What is "grep"
The first animal to orbit Earth was this dog in 1957
Who is Laika?