Vocabulary
Exploits
Linux/Wireshark
Functions
SQL
100

a network that connects computers and devices within a limited geographical area, such as a home, school, or office, to share resources and information.

LAN

100

Where most exploits occur?

Application Layer

100

What type of software is Wireshark?

Network protocol analyzer

100

Defines the structure and content of web pages.

HTML

100

Manages and queries relational databases.

SQL

200

a piece of code, tool, or technique used to take advantage of a vulnerability or flaw in a system, application, or network to perform unauthorized actions.

Exploit

200

To complete the XSS exploit where do you type in the script?

You type the malicious script into input fields on a web page that do not properly validate or sanitize user input, such as comment sections or search bars.

200

Checks connectivity to a host by sending ICMP echo requests


Ping command

200

Enables dynamic, interactive behavior on web pages (e.g., animations, form validation).

JavaScript


200

Injects malicious code to manipulate database queries and retrieve unauthorized data.

SELECT

300

hiding complex implementation details and exposing only the necessary functionality to the user. It helps reduce complexity and improve security by limiting access to sensitive operations or data

Abstraction

300

How does a cross-scripting exploit change a web page?

It injects malicious scripts into a web page, causing it to execute unintended actions such as stealing cookies, redirecting users, or displaying fake content.

300

What protocol is responsible for broadcast messages?

UDP (User Datagram Protocol)

300

Controls the styling and layout of web pages (e.g., colors, fonts)

CSS

300

Alters database contents by combining datasets or introducing malicious data

MERGE

400

The process of intercepting and analyzing data packets traveling over a network. It is commonly used for troubleshooting network issues or, in malicious contexts, to capture sensitive information.

Packet Sniffing

400

What do these represent:

Repeated failed login attempts.

Suspiciously high login activity.

Access attempts from unknown IPs

Brute force attack

400

How do you interrupt the ping command on the Linux system?

Press Ctrl + C to stop command

400

A versatile programming language for tasks like web development, data analysis, and automation.

Python

400

Combines results from two queries to gain access to hidden data.

UNION

500

a format used to store captured network traffic data. It is often analyzed using tools like Wireshark to troubleshoot network issues or investigate incidents.

PCAP File

500

How can you determine how long a handshake took?

By using packet capture tools like Wireshark to measure the timestamps between the SYN and ACK packets

500

Stores and transports data in a readable format for both humans and machines.

XML

M
e
n
u