Reverse Engineering
Cryptography
Physical Security
History
Threat Actors
100

A CLI tool commonly used for printing valid ASCII data from a file

What is strings

100

A simple substitution cipher in which letters are shifted by an offset of 13.

What is Caesar cipher
OR
What is ROT13

100

A popular physical security tool whose mascot is a dolphin

What is a Flipper Zero

100

Created by Robert Morris, infected nearly 10% of the internet

What is the Morris Worm

100

APT widely associated with North Korea and targets mostly banking and financing

What is the Lazarus Group

200

A control mechanism which reverse engineers try to bypass to get paid software for free such as video games

What is DRM

200

A french substitution cipher where each letter is offset by the A1-Z26 representation of the key

What is the Vigenère cipher

200

Tool used for putting tension on the cylinder to allow pin setting

What is a tension wrench
200
Widely considered the first computer virus

What is Brain

200

Russian APT Responsible for NotPetya and repeated power grid attacks on Ukraine

What is Sandworm

300

An anti-reversing technique which malware authors will use to prevent debuggers from gaining introspection on a program

What is anti-debugging

300

Machine created by the nazis in WWII that was used for encrypting military communications

What is the enigma machine

300

A type of door which only allows one person through at a time

What is a mantrap

300

Created after UNIX System V which was not free like its predecessors

What is GNU

300

U.S. APT believed to be affiliated with the Stuxnet attack on Iran

What is the Equation Group
OR
What is Tailored Access Operations

400

An anti-reversing technique which causes the software to rewrite itself every time it runs to change its behavior

What is polymorphic code

400

A public-key cryptosystem which uses the algebraic structure of curves over finite-fields

What is ECC

400

A wireless system which uses radio waves to communicate identification data from tags to readers

What is RFID

400

A sophisticated piece of malware that targeted the Natanz Enrichment Complex in Iran to slow down its nuclear programs

What is Stuxnet

400

Russian APT widely associated with election hacking in 2016 as well as targeting other U.S. government institutions

What is Fancy Bear

500

In x86-64, what instruction is inserted by debuggers into a running program to specify a breakpoint

What is INT3
OR
What is a software interrupt

500

A method of key exchange in which a shared secret is created by combining the public key of one party and the private key of another party

What is Diffie-Hellman key exchange

500

Gaining access to this room is considered one of the hardest things to do in a physical penetration test

What is the server room

500

A piece of malware targeting Ukraine that went beyond its target and caused approximately $10 billion in damages

What is NotPetya

500

Group responsible for hacking Idaho National laboratory last week and demanding the lab to research the creation of catgirls.

What is SiegedSec

M
e
n
u