Malware and Bad Things
The IT Guy
History of the Internet
Famous Hacks
Pop Culture
100

An attack that is formed from active interception or active eavesdropping. Uses a separate computer that accepts traffic from each party in a conversation and forwards the traffic between the two.

What is a Man in the Middle Attack (MITM)

100

The acronym in the OSI model stands for ___

What is Open Systems Interconnection

100

This hacking convention, held annually in Las Vegas, is known for its unusual events, including the "Tamper Evident" contest, which challenges participants to defeat various security seals and barriers.

What is DEF CON

100

Created by a student at Cornell University, was one of the first computer viruses to spread widely on the Internet

What is the Morris Worm

100

In the movie "The Matrix," what is the name of the character played by Keanu Reeves, who is a computer programmer by day and a hacker by night?

Who is Neo (or Thomas A. Anderson)

200

String of code embedded into an application or script that will execute in response to an event. The event might be a specific date or time, or a user acton such as when a user launches a specific program

What is a Logic Bomb

200

The Command that reveals the internet protocol address information of the computer assigned such as DNS, IP address, default gateway, and adapter name regardless if they are active or not. 

What is Ipconfig

200

Early computer network that was utilized in a 1972 demonstration in Washington, D.C to showcase how emails could be sent between two different computer networks

What is ARPnet

200

In 2008, this hacking group defaced the website of the Church of Scientology, sparking a worldwide controversy.

Who is Anonymous

200

This 1983 movie, about a hacker who accesses a military supercomputer and nearly triggers World War III, was praised for its portrayal of computer hacking and its potential consequences.

What is WarGames

300

Criminals who manage botnets. They attempt to infect as many computers as possible and control them through one or more servers running command-and-control software.

Who are bot herders 

300

This may be considered an "IT holiday" that occurs monthly and involves the planning, strategizing, and collaboration of IT personnel from networking, infrastructure, security, and IT governance to harden systems and mitigate vulnerabilities. 

What is Patch Tuesday

300

Created in the early 2000s as a grass-roots campaign originally inspired by hobos in the 1950's 

What is Warchalking

300

In the "Darknet Diaries" episode "The Beirut Bank Job," this group of hackers successfully stole over $100 million from a bank in Lebanon.

Who is the Lazarus Group

300

This popular video game franchise features a group of hackers known as DedSec, who aim to take down corrupt corporations and government agencies through cyberattacks and hacking.

What is Watch Dogs

400

This infamous Trojan horse malware was designed to steal banking credentials and is named after a mythological figure known for his cunning and trickery. What is its name?

What is Zeus

400

The amount of usable hosts on 192.168.2.1/24?

What is 254

400

First computer password ever created, a nod to a song that was popular among the CTSS development team 

What is "tequila"

400

In 2014, this movie studio suffered a major hack that resulted in the release of unreleased movies, sensitive employee information, and embarrassing emails.

Who is Sony?

400

In the hit TV show "Mr. Robot," what was the name of the notorious hacker group led by the character Darlene?

What is fsociety

500

This object, available for retail sale, is capable of injecting dangerous payloads by exploiting how computers handle human interface devices. 

What is a Rubber Ducky

500

The Broadcast Address of 172.30.145.131/25

What is 172.30.145.255

500

Method of sending unsolicited messages or media files via Bluetooth to other nearby Bluetooth-enabled devices, such as mobile phones or laptops. It was often used for harmless pranks or advertising in the early 2000s before smartphones 

What is Bluejacking

500

An infamous computer virus, named after an "exotic dancer" in Florida, would send an email with salacious offers to the first 50 contacts in their victim's email address. Operated using macros and caused millions of dollars in damages to businesses

What is the Melissa Virus

500

Alongside computers, the character Phantom Phreak in the 1995 movie "Hackers" exploits a particular object. This activity became a core part of hacker culture starting from the 1950s until the early 2000s and is called ____. 

What is Phone Phreaking

M
e
n
u