Command that Line (Windows)
Command that Line (Linux)
Threat Attack!
Windows Management
Safety
200

This command let's you send out an ICMP packet to see if it returns back to you and confirms who you contacted is online.

What is ping

200

This addition to a command is used to elevate permissions to an administrator level, but only for that command

What is Super User Do? (What is sudo)

200

This type of attack tries every possible password until it finds the right one.

What is a Brute Force?

200

This Windows program allows you to see all connected hardware to the system, and if that hardware is operational, disabled, or needs troubleshooting

What is Device Manager?

200

This basic tool should be worn, with direct connection to your skin in order to minimize the risk of component damage when you open the case of a computer

What is an Electrostatic Discharge Strap? (ESD)

400

This command will list your IP Address, and can also renew, release or flush the DNS Resolver Cache.

What is ipconfig?

400
This Command will tell you your current location

What is pwd?

400

This kind of attack can be defeated by the use of Bollards. (Or Target's big red balls)

What is a ramming attack?

400

This is the Windows program that lets you view, start, stop or restart any active services on your system

What is Services Console? (Or Services.msc)

400

This laptop monitor part translates lower DC Voltage to higher DC voltage to power the LCD Backlight, and should be handled carefully

What is an inverter?

600

This command is useful for mapping the steps your computer takes to contact another computer or website

What is tracert? (Or Traceroute)

600

This command will allow you to switch users inside of the Terminal shell

What is su?

600

This type of attack can use dumpster diving, vishing phone calls, pretending to be law enforcement or other members of the company, scareware webpages, phising, spear phishing or whaling, or baiting to gain access.

What is Social Engineering?

600

This program within the Microsoft Management Console can allow you to read the logs Windows generates as normal operations.

What is the Event Viewer?

600

This Hardware part of a computer can contain the largest electrical hazard to the user 

What is a Power Supply Unit (PSU)?

800

This command lets you update and enforce the Group Policy rules from your Active Directory/Azure network to your computer

What is gpupdate?

800

This command will let you modify the permissions for an individual file or a full folder

What is chmod?

800

This type of attack uses a custom Access Point programmed with the SSID of a legitimate business nearby to capture and redirect internet traffic

What is an evil twin?

800

This Windows program can show you more detailed information about the System resource use than Task Manager.

What is Resource Monitor?

800

This type of container is what hardware components are stored in until the user is ready to install them.

What is an anti-static bag?

1000

This command allows you to see the current active, in wait, and recently terminated connections to other IP Addresses.

What is netstat?

1000

This Command will let you change the ownership of a Linux file

What is chown?

1000

This type of attack can be defeated with a "man-trap"

What is tailgating?

1000

This program can let you edit the "system map" of Windows, but only should be used with instructions or if you're well practiced in it.

What is Regedit? (Or Regedit.exe, Registry Editor)

1000

This type of appliance can safely remove dust the interior of a computer without risk to the components 

What is a computer vacuum?