This type of hacker has access and permissions to check vulnerabilities on a system.
What is a white hat hacker?
This is a 32-bit address and the fourth version of IP, it is the basis of the Internet, and establishes the rules for the computer networks functioning on the principle of packet exchange.
What is IPv4?
A series of graphical operating systems developed and marketed by Apple Inc.
What is macOS?
This is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
What is a Denial-of-service (DoS) attack?
This is a a digital distribution platform developed by Valve Corporation for purchasing and playing video games.
What is Steam?
Unauthorized use of legitimate identification and authentication data, however it was obtained, to mimic a subject different from the attacker. Impersonating, masquerading, piggybacking, and mimicking are forms of this
What is spoofing?
This IP address is used for loopback address and also for local testing purposes.
What is 127.0.0.1?
A personal computer operating system produced by Microsoft as part of the Windows NT family of operating systems. It was released to manufacturing on August 24, 2001
What is Windows XP?
This is a type of computer security vulnerability typically found in web applications. This vulnerability enables attackers to inject client-side scripts into web pages viewed by other users.
What is a Cross-site scripting (XSS) attack?
This is a freeware and cross-platform messaging and Voice over IP service bought by Facebook. The application allows the sending of text messages and voice calls, as well as video calls, images and other media, documents, and user location.
What is WhatsApp
A type of email or malicious web site that solicits personal, often financial, information by pretending to be a a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem.
What is Phishing ?
225.225.225.0 Is the Subnet-mask for this CIDR Notation
What is a '/24'?
This is a script file in DOS, OS/2 and Microsoft Windows. It consists of a series of commands to be executed by the command-line interpreter, stored in a plain text file.
What is a Batch file?
This ransomware software spread through an exploit developed by the US National Security Agency (NSA) for older Windows systems in May of 2017 with total damages ranging from hundreds of millions to billions of dollars.
What is WannaCry?
This is a commercial computer-aided design and drafting software application. Developed and marketed by Autodesk.
What is AutoCAD
A model designed to guide policies for information security within an organization and made up of Confidentiality, integrity and availability.
What is the CIA Triad. (Or AIC triad)?
This is the field in an IPv4 packet header that typically stays the same during its transmission.
What is a Destination address?
This a commercial Unix operating system originally developed by Sun Microsystems. It superseded their earlier SunOS in 1993
What is Oracle Solaris?
This virus, popular in 2000, comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book and, perhaps more seriously, the loss of every JPEG, MP3, and certain other files on the recipient's hard disk
What is the ILOVEYOU virus?
A open-source software used to discover hosts and services on a computer network by sending packets and analyzing the responses
What is NMAP.
A web application vulnerability in which the server does not check whether the request came from a trusted client or not.
What is a Cross Site Request Forgery (CSRF)?
A CISCO router command to display NVRAM contents.
What is "Show start/show start-config"
This is the command-line to set SELinux in enforcing mode.
What is 'setenforce enforcing'?
This exploit breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to this exploit
What is Spectre?
This a type-1 hypervisor, providing services that allow multiple computer operating systems to execute on the same computer hardware concurrently. It was developed by the University of Cambridge and is now being developed by the Linux Foundation with support from Intel.
Wheat is XEN?