Linux/Unix
Reverse Engineering
&Tools
Cryptography
Social Engineering
Firewalls & Ports
100

What is the linux/unix command to use to list files and directories with in the current directory?

What is ls?

100

Is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon

What is Reverse Engineering?

100

It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

What is Caesar Cipher?

100

____ is the psychological manipulation of people into performing actions or divulging confidential information.

What is Social Engineering?

100

is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

What is a Firewall? or Firewalls?

200

~

What is the Home Directory?

200

Is a portable debugger that runs on many Unix-like systems and works for many programming languages, including Ada, C, C++, Objective-C, Free Pascal, Fortran, Go,[2] and partially others.[3]

What is GDB? or GNU Debugger?

200

With this method of transposition, the plaintext message is encrypted into its scrambled format by being broken up into blocks and encrypted block-by-block.

What is a Block Cipher?

200

_____ is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

What is Phishing?

200

What port is SSH?

What is 22?

300

What does Top do?

What is Displays the processes of CPU?

300

______ is a open source penetration tool used for developing and executing exploit code against a remote target machine it. It also has the world’s largest database of public, tested exploits.

What is Metasploit?

300

_____ is a symmetric-key algorithm for the encryption of electronic data. Although its short key length of 56 bits, criticized from the beginning, makes it too insecure for most current applications, it was highly influential in the advancement of modern cryptography.

What is DES? (Data Encryption Standard)

300

ATM makers, banks, and law enforcement have been scrambling to defend the 400,000 ATMs in the U.S. against?

What is Jackpotting?

300

____ is a user-space utility program that allows a system administrator to configure the tables[2] provided by the Linux kernel firewall (implemented as different Netfilter modules) and the chains and rules it stores.

What is IPTables?

400

The first desktop version of the system was released on March 24, 2001, supporting the Aqua user interface. Since then, several more versions adding newer features and technologies have been released. Since 2011, new releases have been offered on an annual basis.[4]

What is the Macintosh OS? or Mac?

400

____ is a computer file, typically called an image, that behaves like an actual computer.

What is a Virtual Machine?

400

____ is the practice of concealing a file, message, image, or video within another file, message, image, or video

What is Steganography?

400

_____ is information collected from public sources such as those available on the Internet, although the term isn't strictly limited to the internet, but rather means all publicly available sources.

What is OSINT? or Open Source Intelligence?

400

It was first included in Windows XP and Windows Server 2003. Prior to the release of Windows XP Service Pack 2 in 2004, it was known as Internet Connection Firewall.

What is Windows Firewall?

500

He was born December 28, 1969, is a Finnish-American[2][6] software engineer who is the creator and, historically, the principal developer of

Who is Linus Torvalds?

500

This is used for mapping networks and ports with a scanning tool and it features powerful NSE scripts which are perfect for detecting misconfigurations, and collecting information pertaining to network security.

What is NMAP?

500

__________ and is used by Certificate Authorities to check the revocation status of an X.509 digital certificate.

What is OCSP (Online Certificate Status Protocol)?

500

Interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet.

What is Maltego?

500

Commonly Found on ports 6667,6668,6669, and 7000, but can be found at almost any port. 

What is IRC? or Internet Relay Chat?

M
e
n
u