This 2017 ransomware outbreak leveraged an NSA exploit leaked by the Shadow Brokers.
What is WannaCry?
Red team framework known for coining the term “beacons.”
Cobalt Strike
Hacker magazine named after a phone tone.
2600
A protocol for transmitting IP packets over avian carriers.
True
RFC 1149 (and RFC 2549 for QoS)
Vulnerability leaking 64 KB of OpenSSL memory.
Heartbleed
The SolarWinds backdoor malware discovered in 2020 was commonly referred to by this codename.
What is SUNBURST?
Metasploit payloads are called what?
Meterpreter
Hacker alias of Kevin Mitnick.
Condor
"The standard defining HTTP status code 418"
True
‘I’m a teapot’.”
TLS attack exploiting protocol downgrade named after a dog.
POODLE
This 2014 breach exposed over 3 billion user accounts after attackers gained access to a poorly protected internal admin tool.
What is the Yahoo breach?
Credential dumping tool by Benjamin Delpy.
Mimikatz
Old tool used to perform a Classic attack that maps IPs to MACs incorrectly.
Cain and Able
This RFC defines DNS queries over HTTPS with mandatory encryption.
What is DNS over HTTPS (DoH)?
Property that ensures past sessions remain secure if keys leak.
Forward Secrecy
The 2021 supply-chain attack abusing a Java logging library.
Log4Shell
Open-source C2 framework written in Go.
Sliver
The term for pirated software traded on BBSes.
Warez
RFC 9293
What RFC replaces earlier drafts and defines the transport protocol used by HTTP/3?
This attack recovers RSA private keys by exploiting differences in error messages during padding validation.
What is a Bleichenbacher attack?
This credit bureau exposed data on ~147 million Americans in 2017.
Equifax
What does Syswhispers 3 do differently from Syswhispers 2?
Runtime Syscall Resolution
The activity of scanning phone numbers to find modems.
Wardialing
This four-letter acronym titles thousands of internet standards documents, even though it famously means the documents are not final.
What is “Request for Comments”?
This class of vulnerabilities leaks secrets via power consumption rather than execution time.
What are power analysis attacks?