Real-World Attacks
Hacker Tools
Know your Protocols
CTF Skills
Cyber
Security Lingo
100

This attack overwhelms a server with traffic traffic to make it vulnerable.

What is a DDoS attack?

100

This tool scans networks for open ports and services.

What is Nmap?

100

This protocol is used to securely send web pages.

What is HTTPS?

100

This kind of challenge often hides text in images.

What is steganography?

100

This type of hacker has permission to test systems for flaws.

What is a white hat hacker?

200

In this attack, the attacker inserts malicious input into a form to access backend data.

What is SQL injection?

200

This tool automates exploiting known vulnerabilities.

What is Metasploit?

200

This secure shell protocol encrypts remote terminal sessions.

What is SSH?

200

This base format encodes binary as ASCII text.

What is base64?

200

This rule means giving users only what access they need.

What is least privilege?

300

This attack involves intercepting or altering communication between two parties.

What is a Man-in-the-Middle (MITM) attack?

300

This cracking tool is often used to brute-force passwords offline.

What is John the Ripper?

300

This protocol is commonly used to send email.

What is SMTP?

300

This tool lets you inspect network traffic from .pcap files.

What is Wireshark?

300

A fake login page is often used in this type of social engineering.

What is phishing?

400

An attacker tricks a website into running unintended code in another user's browser.

What is Cross-Site Scripting (XSS)?

400

This tool captures WPA handshakes for wireless password cracking.

What is Aircrack-ng?

400

This protocol uses port 161 and helps monitor network devices.

What is SNMP?

400

The command strings is often used on these types of files.

What are binary (or executable) files?

400

This type of malware locks files and demands payment.

What is ransomware?

500

This attack type exploits the fact that users reuse passwords across multiple sites.

What is credential stuffing?

500

This tool is the ultimate tool that haker have.

What is the Internet?

500

This protocol translates domain names into IP addresses.

What is DNS?

500

This kind of box” simulates a vulnerable machine in a lab.

What is a virtual machine (or CTF box)?

500

A flaw in code that’s unknown to vendors is called this.

What is a zero-day vulnerability?

M
e
n
u