Sniffing
Session Hijacking
Firewalls, Honeypots, Etc
Hacking Web Servers
Hacking Web Apps
100

The process of monitoring and capturing all data packets passing through a given network using a software application or hardware device

What is packet sniffing?

100

Session hijacking refers to an attack in which an attacker seizes control of ___ between two computers.

What is a valid TCP communication session?

100

An ___ is also referred to as a "packet sniffer", which intercepts packets traveling via various communication media and protocols, usually TCP/IP

What is IDS?

100
The driver who has finished in the top five in every race this season.

Who is George Russell?

100

The three roles of a web service consist of service provider, service requester, and service _____.

What is registry?

200

Sniffing through a hub, wherein the traffic is sent to all ports

What is passive sniffing?

200

One part of conduct a session hijacking attack.

What is tacking of a session, desynchronization of the session, or injection of commands during the session?

200

Packet filtering firewalls work at the ____ layer of the OSI model

What is network?

200

A computer system that stores, processes, and delivers web pages to clients via HTTP

What is a web server?

200

3 layers of web application architecture

What are client/presentation layer, business logic layer, and database payer?

300

Once the ____ table fills up on a switch, additional ARP request traffic floods every port on the switch.

What is CAM?

300

In a ____ attack, the attacker takes over an existing session either by breaking the connection on one side of the conversation or by actively participating.

What is active?

300

This type of honeypot does not emulate anything; they run actual vulnerable services or software on production systems with real OS and apps. They simulate all services and apps of a target network.

What is high-interaction?

300

A web server consists of a ______ ___. a server root, a virtual document tree, virtual hosting, and a web proxy

What is a document root?

300

This OWASP Top 10 App Security Risk describes vulnerabilities that allow untrusted data to be interpreted and executed as part of a command or query.

What are injection flaws?

400

This sniffing tool lets you capture and interactively browse the traffic running on a computer network.

What is wireshark?

400

A term used to describe a "Live, laugh, love" sign.

What is cheugy?

400

3 parts to firewall architecture

What are bastion host, screened subnet, and multi-homed firewall?
400

In this attack an attacker takes advantage of the DNS recursive method of DNS redirection

What is a DNS Amplification Attack?

400

Before Alex Albon's P10, this was the last year Williams scored points in any Grand Prix

What is 2017?

500

3 ways one might defend against sniffing

Anything listed on page 1202 :)

500

____ Level Highjacking can be defined as the interception of packets during the transmission between a client and the server in a TCP or UDP session.

What is network?
500

2 of 4 general indications of a network intrusion

What is repeated probes of the available services on your machines, connections from unusual locations, repeated login attempts from remote hosts, or a sudden influx of log data?

500
This attack allows an attacker to access sensitive info by intercepting and altering comms between an end-user and web servers.
What is Man-in-the-Middle?
500
This team has had both drivers start and complete every race this season

What is Mercedes?

M
e
n
u