Networking Opportunity
Check your Privilege
Backdoor Man
Recon and Beyond
Potent Potables
100

This piece of information about you computer is used for a variety of system administration, including building a network map, running port scans, and managing an external firewall.

IP Address

100

This is the full path of the file contains a list of local users on a Linux machine.

/etc/passwd

100

Name three pieces of information about a network that would be bad to keep scribbled on a sticky note next to your computer.

Users, passwords, ip addresses, specific computer functions, etc

100

This phrase refers to a visual map of all systems on a network, usually with descriptors about each system like IP addresses, operating systems, and primary services.

Network topology

100

This Pokemon game, originally released for the Gameboy Color, was not remastered for the Nintendo DS along with its generational counterparts.

Pokemon crystal

200

The flags that should be used with the netstat command on Linux

- tulpn, /t,u,l,p,n

200

This command can (and should) be used to change the permissions of a file on a Linux machine.

chmod

200

These files are used to manage parameters and startup settings for applications, server processes, and operating systems.

Configuration files

200

Name two flags that you would usually use with the nmap command.

-sV, -PN

200

Four different starter pokemon gain fighting as their secondary type, making it the most common secondary type among starters. Name one of the two secondary types that are tied for the second most common.

Ground or Dark

300

This is the default firewall software for most Linux distributions.

iptables

300

These two groups contain privileged users.

Wheel and sudo

300

This Linux utility is used to schedule scripts on your machine at a specified time interval.

Cron, cron jobs

300

The security triad informs how we develop secure protocols for data management. Name the there parts of the security triad.

Confidentiality, integrity, and availability/accessibility

300

There are no mono-typed non-legendary pokemon that are this type.

Flying

400

Name an action that you can take to improve your network security by modifying your computer’s firewall rules or managing processes.

Close ports, kill services, block malicious ips

400

This database system has its own list of users that need to be secured.

SQL server database

400

On a Linux machine hosting a web server, this directory would be the most likely place to find a hidden php shell. (Full filepath)

/var/www/html

400

Encryption and obfuscation are two common ways that people try to secure data. Encryption involves using algorithms or mathematics to transform data in order to keep it confidential. Define obfuscation.

Hiding data to make it hard to find.

400

The trainer Red has all four starters from the original game on his team, as well as two other pokemon- one of which is replaced by a third between Gold and Silver and their remakes. Name all three of these pokemon.

Snorlax, Espeon, and Lapras

500

Name three default ports that you might need to keep open using firewall rules, and/or the services that run on them.

Can include:

22 (tcp/udp), 25 (smtp), 53 (dns), 80 (http), 8080 (http alternate), 443 (https)

500

This command can be used to add, delete, disable, and change the password of users on Windows when passed the appropriate parameters.

net user

500

Using this protocol can allow an attacker to take control of your desktop, and should very rarely be allowed on your system at all.

RDP

500

This single linux command, including the appropriate flags and parameters, will delete every file on your computer.

rm -rf /

500

Give the default player names for a Pokemon game that had both a male and female player option.

Red and Leaf; Ethan and Kris; Brendan and May; Lucas and Dawn; Hilbert and Hilda; Nate and Rosa; Calem and Serena; Elio and Selene; Chase and Elaine

M
e
n
u