This is an example of that programming language:
++++[>++++++++++++<-]>+.+.+.
What is Brainfuck?
This irreversible process turns any input into a fixed-length digest, used for verifying data integrity and storing passwords
What is hashing?
This region of memory is used to store things like local variables and return addresses
What is the stack?
This linux command can be used to identify the file type of a file
What is the `file` command?
This tool can store and protect your passwords, as well as generate unique passwords for new websites
Unlike Karate, this martial art has a stronger stance and focuses on power generation.
What is Muay Thai?
The result of 4 ^ 1 ^ 1 ^ 3 ^ 9 ^ 5 ^ 9 ^ 0 ^ 0 ^ 7 ^ 2 ^ 3 ^ 2 ^ 8 ^ 4 ^ 5 ^ 8 ^ 6 ^ 6 (where ^ means xor).
What is 7?
Rather than use variables, assembly languages use these for quick memory access. Some of these are also reserved for storing things like the instruction pointer, the stack pointer, etc.
What is a register?
Here is an example of this encoding scheme:
dGhlcmUgd2FzIG5vIG5lZWQgdG8gZGVjb2RlIHRoaXM=
This piece of data is stored on your machine and is often used to track your interactions with a website and collect data
What is a cookie?
This case alignment system marks the object of a transitive verb and the subject of an intransitive one the same, but separately marks the subject of a transitive verb
What is ergative-absolutive alignment?
This symmetric block cipher was adopted in 2001 by the United States to replace DES, and it is known for its 128, 192, and 256 bit key sizes.
What is AES?
In x86-64, this register holds the second argument to a function
This website is described as the "Cyber Swiss Army Knife", and we used it to randomize the color palette of an image to find data in the least significant bits
What is CyberChef?
This browser was created by the US Navy as a way to protect American intelligence communications online. It is now a free and publicly available software
What is TOR?
These two components of Muay Thai are the primary components of power generation, and characterize the martial art
What are secure stance and hip rotation?
In RSA, an asymmetric algorithm, the message is encrypted with this key. (Sender/Recipient's Public/Private key)
What is the recipient's public key?
This reverse engineering tool can be used to decompile directly to Rust in addition to C, and is considered more user-friendly than Ghidra
What is Binary Ninja?
This file type is really just a `.zip` file, and can be unzipped.
(multiple solutions accepted)
or epub, docx, jar, pptx, xlsx, etc
This VPN company is legally allowed to hide your data from the government
What is Mullvad?
An interesting characteristic of this language is that it switches between nominative-accusative and ergative-absolutive alignments.
obizindawaan
o-bizindaw-aa-n
3- listen.to -DIRECT -3OBVIATIVE
"He listens to the other one"
obizindaagoon
o-bizindaw -igoo-n
3- listen.to -INVERSE -3OBVIATIVE
"The other one listens to him"
You and I are performing Diffie-Hellman key exchange with
p = 883, g = 2.
You generate a = 745, and send me A = g^a = 859.
I generate a random number b, and send you B = g^b = 42.
This is the computed shared key.
What is 188?
By chaining together several of these, one can implement a Return-Oriented Programming (ROP) chain to execute arbitrary code (given a large enough binary).
What is a ROP gadget?
This is a representation of an audio file in visual form that can often be used to hide information
What is a spectrogram?
This operating system works by creating separate virtual machines for everything, even isolating certain drivers.
What is Qubes?