Hacking
Hacker Lingo
Network
Protocols
Misc.
100

He is commonly known as the "greatest social engineer", was jailed by the Feds, and was considered the "most dangerous hacker in the world".

Who is 'Kevin Mitnick'?

100
Words that are written with alternative characters such as r00t and pWn is known as this
What is l33t sp3@k (leet speak)
100

One of the main protocols used to retrieve mail from a server. While POP has wider support, ____supports a wider array of remote mailbox operations which can be helpful to users.

What is 'IMAP'?

100

Residing on the transport layer, this protocol features reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet

What is "TCP"?

100

Referred to as "Alias" in DNS-terms.

What is a "Cname record"?

200

A derogatory term for a new or unskilled hacker.

What is a script kiddie?

200
A term used to tell one that they should read the man page before asking questions
What is RTFM
200

These are the ports used by DHCP to assign IP address information to a network device.

What are UDP ports 67 and 68?

200

This protocol is used for resolution of network layer addresses into link layer addresses

What is "ARP"?

200

The abbreviation behind 'the CIA triad'.

What is Confidentiality, Integrity and Availability?

300

An attack that involves trying every possible combination of letters, numbers, and special characters until the correct password is found.

What is a 'brute force attack'?

300

A computer system that is set up to act as a decoy to lure cybercriminals and to detect, deflect, or study attempts at unauthorized use of information systems.

What is a HoneyPot?

300

This protocol is the primary method used to manage network devices securely at the command level. It is typically used as a secure alternative to Telnet.

What is "Secure Shell or SSH"?

300

A famously sketched routing protocol was done on the back of some napkins, hence often referenced to as the “Two Napkin Protocol”

What is 'BGP' (BorderGatewayProtocol)?

300

This technology cryptographically signs an email

What is DKIM (DomainKeys Identified Mail)?

400

A cryptographic process that transforms any form of data into a unique fixed-size string of characters, which serves as a fingerprint for that data.

What is 'Hashing'?

400

Use of telephone communication to scam the user into surrendering private information that will be used for identity theft.

What is Vishing (Voice-phishing)?

400

A Windows IP diagnostic utility used to trace the route taken by a packet as it hops to the destination host on a remote network.

What is "tracert"

400

Per the Internet Assigned Numbers Authority (IANA), the GRE protocol is assigned this number.

What is "47"?

400

In 2013 this person leaked classified documents revealing the existence of global surveillance programs.

Who is 'Edward Snowden'?

500

A number or bit string used only once, in security engineering, during an authentication process or cryptographic communication. This prevent old communications from being reused in replay attacks.

What is 'Nonce'?

500
Use this option to output nmap results into "leet speak"
What is -oS
500

A command-line packet-sniffing utility.

What is "tcpdump"

500

Version 1 of this protocol was originally introduced in RFC 1945 and later updated in RFC's 2068 and 2616.

What is "HTTP" (Hyper-Text-Transport-Protocol)?

500

These tree people are responsible for one of the oldest widely used public-key cryptosystems for secure data transmission.

Who are 'Ron Rivest, Adi Shamir and Leonard Adleman'?

M
e
n
u