What is the first site we need to access in order to access the ODU virtual environment?
What two tools can we use to analyze our traffic?
Wireshark and T-shark
Which type of user has access to all commands on a linux system?
root user
Who are the people called that work for companies and try to hack them as an outsider?
Ethical hacker, White hat hacker
This is used to prevent unauthorized programs or internet users from accessing a private network or computer
Firewall
What are the commands to get the IP from a Windows computer and a Linux computer?
ipconfig and ifconfig
Data is sent across the network in______?
Packets
Which attack tries every possible combination until it gets the right one?
Brute Force Attack
Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99.
Which part of the CIA triad has been broken?
Integrity
What is the name of the open-source firewall computer software that could be configured through a web-based interface that we used in the camp?
pfSense
What does the CIA triad stand for?
Confidentiality, Integrity, and Availability
These are the endpoints on where a packet wants to go. They are labeled by numbers from 0-65536.
Ports
[29, 84, 15, 48, 13, 22, 94]
Which number has the index value of 4?
13
What test is used to evaluate the security of a system?
Penetration Test
What is the command-line firewall utility that uses policy chains to filter the traffic of data packets that we used in the camp? (Hint: it is a Linux kernel firewall)
iptables
What Raspberry Pi model does Zumi run on?
Raspberry Pi Zero
This ciphertext was encrypted with a Caesar cipher with a phase shift of 2:
igpeadgt
Decode the message.
gencyber
How many total characters are there that could be used to form a password? (hint: this includes lowercase letters, uppercase letters, numbers, and special symbols)
54
62
70
78
D
What program is used to discover vulnerabilities in a network?
Nmap
This network interface includes external network connections i.e router or Internet (www.) (public domain)
Wide Area Network (WAN)
What are the two steganography tools we used in this camp?
Steghide and S-tools
What do these lines of code do?
num = random.randrange(0, 10)
print(num)
create a random integer from 0 to 9, inclusive, and print it to the console (note: doesnt have to be exact words)
___ is a complete suite of tools to assess Wi-Fi network security. It is used for monitoring, attacking, testing, and cracking.
Aircrack-ng
What is the malware that the threat actor intends to deliver to the victim called? (hint: it is an exploit module and is the code that causes the actual damage).
Payload
What command is used to give specific users permission to use specific system commands at the root level of the system?
Sudo