This counselor has a tetris addiction
Melvin
Python
This command allows you to navigate through the linux file system
Change directory (cd)
LAN stands for this
Local Area Network
A firewall can be both _______ and ________ or a combination of the two
Software and Hardware
This phase of penetration testing is when you get approval to access a device or system
Permission
This counselor has two dogs
Caitlyn
The drive mode icon allows you to freely control Zumi, this mode allowed us to run the Jupyter lessons
Learn mode
This command allows you to list the files in a directory
List (ls)
TCP stands for
Transmission Control Protocol
Vishing
The act of psychological manipulation of people is known as
Social engineering
This counselor majored in music
Louis
This major component of Zumi is also a delicious dessert
Raspberry Pi
This file with user account information shows you the password hashes
/etc/shadow
This service runs on TCP port 80
HTTP (Hyper Text Transfer Protocol)
These pfSense parameters control the flow of traffic
Accept, Drop, and Reject
Black and Grey Hat hackers start at this phase of penetration testing
Information Gathering
This counselor likes to learn about different cultures and engage in activities from them
Jykeim
When launching the Jupyter notebook and preparing to code Zumi, you must do this first before you begin
Import libraries
"chmod 765"
Explain this octal file permission set
Owner has all the permissions,
Group has the permissions to read and write,
Everyone else has the rights to read and execute
When using the ping command, these kinds of packets appear in Wireshark
ICMP (Internet Control Message Protocol)
What command do you use to change the intro image in Metasploit
banner
This type of shell connection used for exploiting involves having the target machine communicate with the attacker machine
Reverse shell
This counselor transferred into ODU from Thomas Nelson Community College
Patrick
These teachers are Zumi masters! Name one of the two teachers who demonstrated Zumi for the camp
Dr. Jiang and/or Mr. McDonald
This firewall utility uses policy chains to allow or block traffic
Iptables
EAPOL stands for this
Extensible Authentication Protocol (over LAN)
(Four Way Handshake)
List all six of the GenCyber concepts
Confidentiality, Integrity, Availability, Think like an adversary, Defense in Depth, and Keep it Simple
Name the three policy chains that Iptables uses
Input, forward, and output