Tool and Techniques
Crypto
Network Security
Detection & Response
Attack Types & Vulnerabilities
100

This recon tool can identify open ports, services and operating systems with various scan types

What is Nmap?

100

This 32-character hexadecimal hash algorithm is cryptographically broken but still commonly seen

What is MD5?

100

DDoS is the acronym for this attack method, that overwhelms systems with traffic

What is Distributed Denial of Service?

100

SIEM is an acronym for which system used to collect, analyse, and manage security logs?

What is "Security Information and Event Management"?

100

This text-based attack tricks users into clicking malicious links or revealing credentials

What is smishing?

200
John the Ripper and Hashcat both crack these one-way cryptographic transformations of passwords

What are hashes?

200

Adding this random data to passwords before hashing prevents rainbow table attacks

What is salt?

200

This network security device device filters traffic based on rules, blocking or allowing packets

What is a firewall?

200

This is the phase of incident response between Identification and Eradication

What is containment?

200

XSS attacks inject malicious scripts into websites, with X standing for this word

What is Cross?

300

This directory brute-forcing tool discovers hidden web paths like /admin and /backup 

What is Gobuster? (I'll also accept alternative directory brute-forcers)

300

This encryption method uses the same key for both encryption and decryption and includes algorithms like AES/DES

What is symmetric encryption?

300

This technique divides networks into isolated sections to contain breaches and limit lateral movement

What is network segmentation?

300

This team conducts simulated attacks on an organisation’s systems to test its defences

What is red team?

300

This common web vulnerability allows attackers to inject malicious commands into database queries

What is SQL injection?

400

Hydra performs password attacks against login services like SSH, FTP, and this protocol on port 3389

What is RDP?

400

In Linux password files, hashes starting with $6 indicate this hashing algorithm is being used 

What is SHA-512 Crypt?

400

Disabling this service on port 23 prevents cleartext password transmission to network devices

What is Telnet?

400

This framework by MITRE documents adversary tactics and techniques across the attack lifecycle

What is ATT&CK?

400

The 2014 Heartbleed vulnerability affected this widely-used cryptographic library  

What is OpenSSL?

500

In Linux, this command would list the directory contents of /home/jesse including hidden files

What is 'ls -a /home/jesse'?

500

This is the input that results in the following NTLM hash: 72FC5EF38C07F24388017C748CEAB330

What is "helloworld"?

500

This open source VPN protocol operates on UDP port 1194

What is OpenVPN?

500

This principle ensures evidence hasn't been tampered with by documenting every person who handled it

What is chain of custody?

500

EternalBlue exploited SMBv1, leading to this 2017 ransomware outbreak that crippled hospitals

What is WannaCry?

M
e
n
u