forensics
web
data science
cryptography
RVCTF
100

What kind of data are you analysing from a .pcap file

network traffic data

100

What is the full name of the error code 404

404 Not Found

100

What does csv stand for

Comma Separated Values

100

What is the encryption used here? UlZDVEZ7SmVvcGFyZHlCb25kaW5nIX0=

base64

100

Whats RVCTF's instagram @

rv.ctf

200

What is commonly used command to read the metadata of a file

exiftool

200

What does XSS stand for?

Cross Site Scripting

200

What python library is commonly used when working with tables and data frames

Pandas

200

This cipher replaces each letter with letter a fixed number of places in the alphabet ahead.

What is this cipher

Caesar cipher

200

Which teacher is in charge of RVCTF (full name)

Mr Chan Him Nok

300

name 3 password cracking tools

hydra, john the ripper, hashcat

300

You see a URL like this: https://example.com/page.php?id=1.
What kind of vulnerability should you test for?

SQL Injection or IDOR (Insecure Direct Object Reference)

300

What function is used to remove NaN values for pandas?

dropna()

300

Describe what XOR does 

It compares two input bits and generates one output bit if the bits are the same, the result is 0 if the bits are different, the result is 1

300

Whats the current RVCTF president's full name

LIANG JUN CHENG, AARON

400

You’re given a .zip file that’s only a few KB, but extracting it crashes your system or causes high resource usage, what is this file called?

A ZIP bomb

400

What is the purpose of a robots.txt file on a website?

It tells web crawlers (like search engine bots) which pages or directories they are allowed or disallowed to crawl.

400

Which scikit-learn function splits your dataset into training and testing sets?

train_test_split()

400

How does the keys in RSA work?

One key encrypts the plaintext into cipher text and the other key decrypts the cipher text into plaintext


400

What year was RVCTF founded

2022

500

What is the file signature for a PNG file

89 50 4E 47 0D 0A 1A 0A

500

What’s the difference between stored XSS and reflected XSS?

Stored XSS is saved on the server and shown to all users; reflected XSS is in the URL/request and affects only the person who clicks the link.

500

What does random_state affect? 

Ensures that the same data points are assigned to each set every time the code is run

500

Why must prime numbers in generating RSA keys be far apart 

So that the attacker is unable to use Fermat’s factorisation method to find the key

500

Whats the name of the first president of CTF

Guan Chen Di

M
e
n
u