???
Crypto
Rev/Pwn
Forensics
Personal Security
100

This is an example of that programming language:

++++[>++++++++++++<-]>+.+.+.

What is Brainfuck?

100

This irreversible process turns any input into a fixed-length digest, used for verifying data integrity and storing passwords

What is hashing?

100

This region of memory is used to store things like local variables and return addresses

What is the stack?

100

This linux command can be used to identify the file type of a file

What is the `file` command?

100

This tool can store and protect your passwords, as well as generate unique passwords for new websites

What is a password manager?
200

Unlike Karate, this martial art has a stronger stance and focuses on power generation.

What is Muay Thai?

200

The result of 4 ^ 1 ^ 1 ^ 3 ^ 9 ^ 5 ^ 9 ^ 0 ^ 0 ^ 7 ^ 2 ^ 3 ^ 2 ^ 8 ^ 4 ^ 5 ^ 8 ^ 6 ^ 6 (where ^ means xor).

What is 7?

200

Rather than use variables, assembly languages use these for quick memory access. Some of these are also reserved for  storing things like the instruction pointer, the stack pointer, etc.

What is a register?

200

Here is an example of this encoding scheme:

dGhlcmUgd2FzIG5vIG5lZWQgdG8gZGVjb2RlIHRoaXM=

What is Base64?
200

This piece of data is stored on your machine and is often used to track your interactions with a website and collect data

What is a cookie?

300

This case alignment system marks the object of a transitive verb and the subject of an intransitive one the same, but separately marks the subject of a transitive verb

What is ergative-absolutive alignment?

300

This symmetric block cipher was adopted in 2001 by the United States to replace DES, and it is known for its 128, 192, and 256 bit key sizes.

What is AES?

300

In x86-64, this register holds the second argument to a function

What is RSI?
300

This website is described as the "Cyber Swiss Army Knife", and we used it to randomize the color palette of an image to find data in the least significant bits

What is CyberChef?

300

This browser was created by the US Navy as a  way to protect American intelligence communications online. It is now a free and publicly available software

What is TOR?

400

These two components of Muay Thai are the primary components of power generation, and characterize the martial art

What are secure stance and hip rotation?

400

In RSA, an asymmetric algorithm, the message is encrypted with this key. (Sender/Recipient's Public/Private key)

What is the recipient's public key?

400

This reverse engineering tool can be used to decompile directly to Rust in addition to C, and is considered more user-friendly than Ghidra

What is Binary Ninja?

400

This file type is really just a `.zip` file, and can be unzipped.

(multiple solutions accepted)

What is a word document?


or epub, docx, jar, pptx, xlsx, etc

400

This VPN company is legally allowed to hide your data from the government

What is Mullvad?

500

An interesting characteristic of this language is that it switches between nominative-accusative and ergative-absolutive alignments.

     obizindawaan
o-bizindaw-aa-n
3- listen.to -DIRECT -3OBVIATIVE
"He listens to the other one"    

     obizindaagoon
o-bizindaw -igoo-n
3- listen.to -INVERSE -3OBVIATIVE
"The other one listens to him"

What is Ojibwe?
500

You and I are performing Diffie-Hellman key exchange with
p = 883, g = 2.

You generate a = 745, and send me A = g^a = 859.

I generate a random number b, and send you B = g^b = 42.

This is the computed shared key.

What is 188?

500

By chaining together several of these, one can implement a Return-Oriented Programming (ROP) chain to execute arbitrary code (given a large enough binary).

What is a ROP gadget?

500

This is a representation of an audio file in visual form that can often be used to hide information

What is a spectrogram?

500

This operating system works by creating separate virtual machines for everything, even isolating certain drivers.

What is Qubes?

M
e
n
u