In the News
Intro to
Cyber Security
Red Team
Blue Team
Geek Potpourri
100
Hotel chain that was breached, impacting 500 million customers

Marriott

100

The "C" in C-I-A stands for this

Confidentiality

100

#1 method for attackers to gain access to a target network

Phishing

100

System Hardening 101: Always disable these

Unnecessary services and/or accounts

100

*SPOILER ALERT* Thanos loses in this movie

Avengers: Endgame

200

Charming Kitty is thought to be associated with this country - targeting US officials enforcing sanctions

Iran

200

Law protecting the private health care related information of individuals in the U.S.

HIPAA 

(Health Insurance Portability and Accountability Act of 1996)

200

OSINT stands for this

Open Source Intelligence

200

Block Internet access from your servers to prevent attackers using this type of infrastructure to control them

C2 (C&C - Command & Control)

200

The Alliance and Horde battle over this homeworld

Azeroth
300

This company was, or was not, infiltrated by the Chinese military in a supply chain attack on their motherboards

Super Micro 

(Supermicro)

300

Type of penetration test where the client provides NO information about the target environment

Black box

300
EternalBlue exploits this missing Microsoft patch

MS17-010

300

Cliff Stoll literally wrote the book on incident handling

The Cuckoo's Egg

300

This new D.C. movie, mostly underwater, will probably suck as much as the others - except Wonder Woman

Aquaman
400

An encrypted instance of this is created every two minutes

Phishing site

400

Type of malware which spreads without user interaction

Worm

400

fierce, amass, subbrute, recon-ng

Subdomain (and domain host) enumeration

400

DNS servers should be configured to not allow these outside authorized servers

Zone transfers

400

The sequel to Red Dead Redemption

Red Dead Redemption 2

500

This cyberespionage campaign "sniped" at defense, government and industrial control environments with job posting phishing attacks

Sharpshooter

500

DES key length - in bytes

56-bits = 7 bytes

500

msfvenom can be used to create these types of encoded objects

Payloads

500

Find these before malware can automatically spread to them or someone on your network reads exposed files within

Open/unrestricted shared folders

500
Jeff Bezos saved the Eathers, Martians and Belters in this SyFy show from total annihilation

The Expanse

M
e
n
u