What is the file type of this image?
WEBP
What does DNS stand for?
Domain Name System
What type of hash is this and when you crack the password what is the result? b03a894e101746d09277f1f255cc8a40
MD5 Hash, Cybersecurity
Decrypt: aGFtb29kIGhhYmliaSBoYW1vb29k
hamood habibi hamoood
What is the term for a technique in data gathering that involves exploiting the trust relationship between a user and a system, leading users to unknowingly provide sensitive information, such as login credentials or personal data?
Social Engineering
What is the MAC address for broadcast?
ff:ff:ff:ff:ff:ff
What kali linux tool helps you crack password hashes?
Hashcat
Decrypt: nnyvlnu vf fb pbby naq fzneg naq shaal
aaliyah is so cool and smart and funny
What is the 55 John St Wifi Passcode?
@55johnstreet
What device is involved with this packet capture?
iPhone
Crack these passcodes:
fc63f87c08d505264caba37514cd0cfd b5d5f67b30809413156655abdda382a3 53dd9c6005f3cdfc5a69c5c07388016d 8be00be9adc4c758de9a23a6f31f03be
Nicole, Fatima, Justin, Aaliyah
Decrypt: MDExMDAxMTAgMDExMDAwMDEgMDExMTAxMDAgMDExMDEwMDEgMDExMDExMDEgMDExMDAwMDEgMDAxMDAwMDAgMDExMDEwMDAgMDExMDAwMDEgMDExMTAxMDAgMDExMDAxMDEgMDExMTAwMTEgMDAxMDAwMDAgMDExMDEwMDAgMDExMDAxMDEgMDExMTAwMTAgMDAxMDAwMDAgMDExMDExMDEgMDExMDAxMDEgMDExMDExMTAgMDExMTAxMDAgMDExMDExMTEgMDExMTAwMTAgMDAxMDAwMDAgMDAxMDEwMDAgMDExMDAwMDEgMDExMDAwMDEgMDExMDExMDAgMDExMDEwMDEgMDExMTEwMDEgMDExMDAwMDEgMDExMDEwMDAgMDAxMDEwMDE
fatima hates her mentor (aaliyah)
What is the one-word term for the practice of determining a device's location by analyzing the timing and strength of radio signals from multiple cellular towers or base stations?
Triangulation
What is a method used to decrypt TLS / SSL traffic in Wireshark?
SSL Key Log file
What does the -m 0 option indicate in hashcat?
MD5 Hash Type
Decrypt: MV3GC3RAMFWHI3LBNY======
Evan altman
What format is this barcode in?
PDF417
What is happening in this interaction?
Device pinging server to show it is alive
What is the difference between a mask attack and a brute-force attack?
Both try all combinations from a given key space, but a mask attack is more specific
Decrypt: ulcly ihjr kvdu ulcly doha
Never back down never what