What is a "C2 server" short for?
______ and _______ server.
Command and Control server
Ghidra is a software reverse engineering (SRE) suite of tools developed by?
NSA
___ is designed to transfer files with ease, so it focuses on simplicity rather than security (uses port 21 / 20).
What encoding converts "HELLO" to "EB61EEAD90E3B899C6BCBE27AC581660"?
MD5
This organization often provides guidelines for malware analysis.
MITRE
A name for a collection of compromised systems that can be used as a platform for a DDoS (Distributed Denial of Service) attack?
Botnet
What do EnCase, Forensic Toolkit (FTK) and The Sleuth Kit (TSK) all have in common?
Forensic tools used to examine data on a hard drive
what does "nmap -sS" command do?
TCP SYN Port scan
A technique to add additional data to an input before it is stored as a hash (which can also provide protection against attacks that use rainbow tables).
Salting
(Provides protection against precomputed tables and can also prevent duplicate passwords from being identified).
Inetsim is a program that only runs on which operating system?
Linux
What tool can recover Windows account passwords from RAM?
Mimikatz
Who is Michael, Jonathan, Parker, Howard, Austin, Pranava
Which service uses port 53 by default?
DNS
What term is used to describe the property of a secure network where a sender cannot deny having sent a message?
Non-repudiation
Malicious code activated by a specific event is called
Logic Bomb
A type of connection in which the attacker machine has a listener port open to receive a connection from the victim machine?
reverse shell
In this case, forensic experts analyzed email accounts from his time at Harvard and found no signs of the email chain this individual produced alleging an agreement between the two to share the company 50/50.
What is the case of Paul Ceglia vs Mark Zuckerberg
How many legs does a spider have?
8
A technique that uses a cryptographic hash function or a block cipher repeatedly in a loop (hashing a hash in iteration).
Key stretching
This type of analysis analyzes malware without executing it.
Static analysis
The name of the computer that beat the best human Jeopardy player ever.
IBM Watson
A Digital forensic tool highlighted in the BTK serial killer case.
What is EnCase?
What is the name of the pcap driver used when running Wireshark on a Windows computer?
winpcap
How many bones does a shark have?
0
A DLP (Data Loss Prevention) solution that scans endpoints and mail on production servers is to prevent what?
Data exfiltration