Protocols📧
Cryptography˚☽˚.⋆
Infamous Cybersecurity Attacks✴
Famous Kali Tools✧₊⁺
Popular Cyber Attacks👾
100

A connection-oriented protocol that requires reliable delivery of data

What is TCP?

100

This type of cryptography uses the same key for both encryption and decryption.

What is symmetric encryption?

100

In 2017, this ransomware attack infected hundreds of thousands of computers worldwide, demanding payment in bitcoin.

What is WannaCry?

100

This tool is a classic network scanner used to discover hosts and services on a network

What is Nmap?

100

In this type of attack, a hacker floods a network, server, or website with excessive traffic to make it unavailable to legitimate users.

What is a Denial-of-Service attack?

200

A connectionless, high-speed protocol that does not ensure delivery of data

What is UDP?

200

This system uses a public key to encrypt data and a private key to decrypt it.

What is RSA?

200

In 2000, this computer virus spread worldwide via email with a very affectionate subject line, causing billions in damage.

What is the ILOVEYOU virus?

200

This tool allows you to intercept, inspect, and modify HTTP and HTTPS traffic between a client and a server.

What is Burp Suite?

200

This attack tricks users into running malicious programs by disguising them as legitimate software or updates.

What is a trojan?

300

The primary purpose of this protocol is to translate human-readable domain names into IP addresses.

What is DNS?

300

This algorithm allows two parties to agree on a shared secret over an insecure channel without transmitting the secret itself.

What is Diffie-Hellman?

300

In 2017, this malware targeted industrial systems and was notable for its ability to cause physical damage Iranian nuclear centrifuges.

What is Stuxnet?

300

This password cracking tool is known for its speedy brute force style, supporting hundreds of hash types.

What is Hashcat?

300

This advanced attack involves exploiting a previously unknown vulnerability in software or hardware, often used in high-profile nation-state attacks.

What is a zero-day attack?

400

In SMTP, this command can used by clients to request a server's supported extensions.

What is EHLO?

400

In HTTPS, this cryptographic protocol negotiates encryption algorithms and keys between client and server. 

What is TLS?

400

First sighted in 2004, this computer worm became the fastest-spreading e-mail worm ever, with a text message reading "Andy; I'm just doing my job, nothing personal, sorry,".

What is Mydoom?

400

This open-source OSINT tool checks hundreds of social media platforms to determine whether a username exists across multiple sites. 

What is Sherlock?

400

In this type of attack, attackers manipulate network traffic to redirect users to malicious websites or steal sensitive data without their knowledge.

What is DNS spoofing?

500

In DNS, when a server returns a referral to another server contact instead of a final answer, it is responding to this type of query.

What is an iterated DNS query?

500

This property of a cryptographic system ensures that even if a long-term key is compromised, past communications stay secure.

What is perfect forward secrecy?

500

Released in 1988, this worm is one of the first to be released across the early internet, infecting thousands of computers and causing significant disruption.

What is the Morris worm?

500

this high-speed network scanner can scan the entire IPv4 address space in minutes by using asynchronous packet transmission and its own custom TCP/IP stack.

What is Masscan?

500

This local network attack involves sending forged ARP messages to associate the attacker's MAC address with another device's IP address.

What is ARP poisoning?

M
e
n
u