Acronyms
Index=?
Cyber News
Random Tech
Networking
100

TAO

Tactical Analyst Support

100
CFG Proxy Logs

forcepoint

100

The company that created this network management tool was breached in early 2020 resulting in one of the largest supply chain attacks in history

SolarWinds

100

Cat 5e cables use this many wires and pins

8

White/orange

orange

white/green

blue

white/blue

green

white/brown

brown

100

Translate this binary number to decimal.

1100

12

200

PCAP

Packet Capture

200

Windows Event Logs

wineventlog / windows / security

200

Fancy Bear or APT28 or the Sofacy Group hails from this country

Russia

200

This metric measures how often a display is able to draw a new image. 

Refresh Rate, measured in Hertz (Hz)

200

This network management protocol is used on IP networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture. 

DHCP

300
HTTP

Hyper Text Transfer Protocol

300

CFG F5 VPN Logs

f5bigip
300

This malicious computer worm was first uncovered in 2010 and caused substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel in a collaborative effort 

Stuxnet

300

This file can operate as virtual memory and be used as additional RAM when space there is limited.

Page File

300

In the CFG network, DHCP is handled by this proprietary tool. 

Infoblox DHCP 

400

AES

Advanced Encryption Standard
400

CFG DHCP logs

infoblox

400

This commercially available red team platform was created in 2012 by Raphael Mudge and uses an agent named "Beacon". Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. 

Cobalt Strike 

400

This firmware performs the POST (Power On Self Test) and contains instructions for loading hardware. It runs prior to the operating system on personal computers

BIOS (basic input/output system)

400

This protocol is used by routers to map a dynamic IP address to a permanent physical machine address in a local area network

Address Resolution Protocol (ARP)

500

GRC

Governance, Risk Management, and Compliance

500

Cloudtrail Logs

aws

500

The domain iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com was hardcoded into this ransomware variant and its registration stopped the spread in its tracks

WannaCry 

500

This unit of measurement is equal to one sextillion bytes  (1,000,000,000,000,000,000,000) bytes, or, one is equal to a trillion gigabytes. After Gigabyte comes Terabyte, Petabyte, Exabyte, and then this multipe-byte unit.

Zettabyte

500

The technique of Onion routing now popularly used by the TOR project was developed by this group to protect U.S. intelligence communications online. 

United States Naval Research Laboratory is the corporate research laboratory for the United States Navy and the United States Marine Corps. It conducts basic scientific research, applied research, technological development and prototyping.