This principle won't allow you to access something....unless you must!
What is Least Privilege?
This program can be used to sniff packets.
What is wireshark?
AP
What is an Access Point?
All hail this cipher, used by royal romans!
What is the Caesar cipher?
Chris Hemsworth plays this type of hacker in a titular movie. Don't break the law!
What is Blackhat?
Reducing the attack surface is an example of this principle.
What is Minimization?
This program is ideal for scanning a network.
What is nmap?
RCE
What is Remote Code Execution?
This cipher took hundreds of years to find a valid attack.
What is the vignere cipher?
This rich business magnate hacks during a government hearing in this film.
What is Ironman 2?
A company employs secure password policy, a firewall, intrusion detection software, and more is an example of this.
What is layering?
This program is can be used to look up dns records.
What is dig?
HTTPS
What is Hyper Text Transfer Protocol?
A name for unencrypted text.
What is plaintext?
Lets go Mobile! This villian hacks into the stock market in one Nolan's Dark Knight Trilogy.
Who is Bane?
Understanding a process or function in its most essential form.
What is abstraction?
This tool can be used to spoof mac addresses.
What is ettercap?
DIG
What is domain information groper?
A type of encryption that uses two keys.
What is asymmetric crypotography?
This movie's title is another name for a penetration tester. Popular in the 1990s! (Check out my new kicks!)
What is Sneakers?
Only allow processes to interact with information they need is called this.
What is encapsulation?
This program is often used to automate sql injection.
What is sqlmap?
PHP
What is Hypertext Pre Processor?
The key you use to sign something.
What is YOUR private key?
A 2016, Zero Days documentary sheds light on what famous Iran Nuclear Program hack.
What is StuxNet?