Skynet’s Interns
Ctrl+Alt+Defeat
Fun with Red Tape
Beyond The Ping
Undefined Behavior
100

Born in Chicago, IL, this CEO of OpenAI probably wishes his technology could somehow make the Bears win more often.

Who is Sam Altman?

100

This legendary phone phreak and social engineer once hacked Pacific Bell, went on the run, and later became a famous security consultant, because redemption arcs sell.

Who is Kevin Mitnick?

100

This healthcare-focused U.S. regulation ensures your doctor doesn't accidentally (or purposefully) tweet your MRI results.

What is HIPAA? 

100

This Linux system lets you schedule a program to run at a specific time, the hacker’s favorite way to automate bad decisions.

What is Cron? 

100

This security method helps protect your accounts even if your password is stolen.

What is 2FA or MFA? 

200

When an attacker manipulates Ai's input to make it ignore prior instructions or perform unintended actions.

What is a prompt injection attack?

200

In 2024, a faulty software update from this cybersecurity company caused a massive, worldwide IT outage that affected millions of Windows computers. 

What is Crowdstrike?

200

This U.S. federal agency within the Department of Commerce that develops and promotes measurement standards, technology, and best practices to enhance innovation, improve industrial competitiveness, and strengthen national security. 

What is National Institute of Standards and Technology (NIST)?

200

This Linux command searches for patterns in text using regex — it’s both powerful and confusing enough to make you question your career choices.

What is grep?

200

Think of it as keyboard spam with purpose: throw enough guesses at an account until the right one cries uncle. Works great if your password policies are still partying like it’s 2005.

What is brute force? 

300

 Like fixtures that prevent people from falling from great heights, this term refers to the security feature in GenAI models that block inappropriate requests.

What are guardrails?

300

This 2017 breach of a credit bureau exposed the personal data of 147 million Americans, ironically making the company's name sound like a bad joke

What is Equifax? 

300

This EU regulation made "right to be forgotten" a household phrase and gave every website that annoying pop-up about cookies

What is GDPR? 

300

This Linux command changes file permissions, but if you misuse it you've basically left your system's front door wide open

What is chmod?

300

This technique maps open ports and identifies running services on a host, the reconnaissance staple most defenders and attackers both learn first. 

What is Port Scanning?

400

Jeopardy within Jeopardy! This IBM system wowed Alex Trebek and a global audience when it defeated Ken Jennings and Brad Rutter in 2011.

What is Watson?

400

In 2015, this "connected car" hack let researchers remotely take control of a vehicle on the highway, proving sometimes your vehicle just needs a firmware update, not a tune up.

What is Jeep Cherokee?

400

This California law gave residents the right to know what personal info companies collect and sell. Basically, GDPR's West Coast Cousin 

California Consumer Privacy Act

400

This command shows all open network connections and listening ports, perfect for finding that sketchy process whispering on TCP 4444  

What is netstat?

400

This technique involves code format modification to make it harder to understand. 

What is obfuscation? 

500

You've certainly used the tool, but the letters actually stand for something! GPT, the model family that has helped many a student finish a last-minute essay, is an abbreviation for these three words.

What is Generative Pretrained Transformer?

500

In 2020, this supply chain attack infiltrated multiple U.S. federal agencies via a compromised update.

What is SolarWinds? 

500

Signed in 2018, this U.S. regulation set the rules for collecting data from users under 13, because "ask your parents" finally became federal policy.

What is Children's Online Privacy Protection Act("COPPA")?

500

This command reveals every stop your packets make on their way to a destination — perfect for figuring out why your traffic took a scenic route through Singapore.

What is traceroute? 

500

This kind of malware modification rewrites parts of its own code.

What is polymorphism?

M
e
n
u