What port does BGP use?
179
What type of cipher is the Cesaer cipher?
Substitution cipher
What does the "grep" command do?
Used to search text or search the given file for lines containing a match to the given strings or words
When does the 2020 Spring Season Registration of NCL start?
February 10
Name three topics that are in the individual game
Open source intelligence, cryptography, scanning, log analysis, network traffic analysis, wireless exploitation, web application exploitation, and enumeration & exploitation
What port does Microsoft Remote Desktop require to be open?
3389
What is the sha1 hash of: "large-shake"?
F6B66B08662D7184213F343F2FD774FF1D27878D
What type of attack does John the Ripper do?
Dictionary attack
Samy is my...
Samy is my hero, cross-site scripting worm
What are the three brackets you will be placed into after completing the preseason?
Gold, silver, or bronze
0x93 ^ 0x96
5
Decode: V2hhdCBpcyB0aGUgYmVzdCB0aGluZyBhYm91dCBTd2l0emVybGFuZD8gSSBkb24ndCBrbm93IGJ1dCB0aGUgZmxhZyBpcyBhIGh1Z2UgcGx1cy4=
What is the best thing about Switzerland? I don't know but the flag is a huge plus.
Which of the following represents the weakest security setting on a Linux file system?
* chmod 000
* chmod 444
* chmod 777
* chmod 755
chmod 777
Name three different attacks that can be done with Hashcat
Brute-force, Mask, Dictionary, Combination, Hybrid, Rule-based, Toggle-case
Who scored first place in the 2019 Spring Individual Game?
Tyler Chong [UHawaii GH] bit.ly/2UnFuP6
What is the name of the malware included in CCleaner?
Floxif
Decode: FXL-OLJV-4127. It seems to start with SKY
SKY-BYWI-4127
What is the format for the John the Ripper command?
john --wordlist=/location/dictionaryList.lst passwordHere
We have intercepted an email sent between hackers. What version of MIME is being used?
Link: https://drive.google.com/file/d/1leKG3ZdIKxJtjNqQ1LMDQdzYt2QqNGtl/view
1.0
Who is a well known NCL ambassador and created questions for the 2019 Fall season in open source intelligence?
Crypto Kait
Quick Note: Her blog is a great resource
What programming language is StrongIntro's server written in?
Javascript
==============
| 1 2 3 4 5 6|
|1 0 1 2 3 4 5|
|2 6 7 8 9 A B|
|3 C D E F G H|
|4 I J K L M N|
|5 O P Q R S T|
|6 U V W X Y Z|
==============
=====MESSAGE==========================
54 33 33 65 52 65 42 21 54 15 64 45 15 33 55 65 45 33 33 65
=====END=============================
MEET AT 91 MONROE STREET
Polybius Square
You gain this information from a data breach:
Hash:fdsaf87070d98s0af7807as8fd
Password length: 8 characters
First four characters are "Feli"
Last four characters are numbers
How would you write the Hashcat command for this?
Hint: You have done this in NCL
hashcat -m 0 -a 3 fdsaf87070d98s0af7807as8fd "Feli" ?d?d?d?d --show
We have intercepted an email sent between hackers. What is the sender's email address? What day of the week was the message received?
Link: https://drive.google.com/file/d/1leKG3ZdIKxJtjNqQ1LMDQdzYt2QqNGtl/view
gh0st@hacknet.cityinthe.cloud
What is the number one thing you should never do?
Hint: It involves flags
NEVER SHARE FLAGS