What type of hash is this?
SHA512
What port is SSH listening on?
Port 22
What service is the port number 3389 used for?
Remote Desktop Protocol (RDP)
What is the name of the widely used cryptographic algorithm for securing data transmission over the internet, commonly used in HTTPS?
TLS (Transport Layer Security)
Decrypt this: SnVzdGluIGlzIHRoZSBiZXN0IHByZXNpZGVudCBldmVyIQ==
Base64 -> Justin is the best president ever!
True/False: You can crack multiple hashes at once
True
Which IP successfully logged into the system?
75.215.321.99
What form of IP addresses touch the internet?
Public IP
What is the name of this building, and where is it?
Cathedral of learning, Pittsburgh PA
Decrypt this: G jmtc Awzcpqcaspgrw Ajsz
ROT24 -> I love Cybersecurity Club
Which attack mode in Hashcat involves using multiple wordlists to generate a larger and more comprehensive dictionary for cracking passwords?
Combinator attack
How many bytes is "DSC_3043.JPG?"
7024038 bytes
Is 10.0.0.15 a public or private IP address?
Private
Identify a technique used by threat actors to mask their true identity by routing network traffic through multiple intermediate servers.
IP spoofing
Decrypt this: xrssvlru
ROT18 -> keffiyeh
What type of hash is this, and what is the decrypted hash?
MD5, jeffrey (aka fatimas boyfriend)
What is one of the best enterprise-grade log analyzers?
Splunk
What is the username and password combination that was accepted by the server? Is the IP public or private?
Username: user1, Password: metropolis. IP is public
What type of format is this barcode in?
EAN_13
Decrypt this: (It's too large to add here)
Hex -> binary, band for band
What kind of attack is this, and an attack on what mode?
hashcat -m 1000 -a 3 hashes.txt ?|?|?|?|?|?|
How many bytes have been transferred in this log file?
882524369 bytes
What form of encryption is being used to send application data?
TLSv1.2
What software was used to edit this photo?
Adobe CS4 Macintosh
Decrypt this: (It's too large to add here)
Binary -> morse code, Anita max wynn