Day 1: Virtual environment and Steganography
Day 2: Traffic analysis
Day 3: Access Control and Wi-Fi password cracking
Day 4: Ethical hacking and penetration testing
100
When you log in to the virtual environment, this is the operating system you'll see first

Windows 10

100

This command line tool is used for traffic analysis

Tshark

100

This account has the highest privilege in Linux

Root account (superuser)

100

An advantage of this pentest type is that it provides the most comprehensive coverage of vulnerabilities

White-box

200

In steghide, -cf means this

Cover file

200

Each layer in a packet has it's own address and is read by different processes much like a complex _______

Mailing process

200

A user's account is used inappropriately, fraudulently, maliciously, accidentally, or through willful ignorance of policies

Privilege abuse

200

Two steps within the pentest methodology that are only followed by ethical hackers

Pre-engagement and Reporting

300

When you use this option on S-tool, you'll be prompted to enter a passphrase

Reveal

300

What is a MAC address?

It is an ID unique to a piece of hardware

300

This password cracking method uses an additional file which contains a list of words

Dictionary attack

300

The flag "-A" in Nmap combines several of these features (give two features)

Host discovery, OS detection, open/closed ports, service version detection

400

192.168.217.3 is the IP that belongs to which virtual machine in the bootcamp environment?

Attacker Kali

400

At which layer in a packet is the IP address located

The internet layer

400

We use this command to decrypt a wifi traffic file

Airdecap-ng

400

Metasploit is owned by this Boston based security company

Rapid7

M
e
n
u