Networking Ninjas
Attack Tactics
OSINT Ops
Crypto Corner
SOC Sleuths
100

This layer of the OSI model is responsible for IP addressing.

What is the Network Layer?)

100

This type of email attack tricks victims into revealing sensitive info.

What is phishing?

100

OSINT stands for…

What is Open-Source Intelligence?

100

This cipher shifts letters by a fixed number.

What is Caesar cipher?

100

This device inspects network traffic and blocks packets based on a rule-set; it sits at network borders.

What is firewall

200

Port 443 is typically used for this secure protocol.

What is HTTPS?

200

Malware that locks files and demands payment is called…

What is ransomware?

200

This site is often used to look up old versions of websites.

What is the Wayback Machine?

200

SHA-256 is this type of function.

What is a hashing algorithm?

200

An IDS that runs on a host (not the network) and monitors local logs & system calls is called…

What is HIDS

300

This protocol translates domain names to IP addresses.

What is DNS?

300

This attack floods a target with traffic to make it unavailable.

What is a DDoS?

300

The tool theHarvester is commonly used to gather what?

What is Emails & domains

300

RSA relies on the difficulty of factoring large…

What are prime numbers?

300

Signature-based detection looks for known patterns. Name one drawback of signature-based IDS.

What is Zero Day 

400

Which Wi-Fi security protocol is considered most secure today: WEP, WPA2, WPA3 or WPA4 ?

What is WPA3

400

Exploiting a web app by injecting SQL queries is called…

What is SQL Injection?

400

This tool can scan GitHub repositories to uncover sensitive information like API keys or passwords.

What is GitLeaks

400

Which key type is shared in symmetric encryption?

What is the secret key?

400

Name the open-source network IDS that uses rules/signatures and is popular for learning and labs.

What is snort / What is suricata 

500

This type of attack spoofs ARP messages to reroute traffic.

What is ARP poisoning?

500

A zero-day exploit targets what?

A vulnerability unknown to the vendor.

500

What Google search operator would you use to find login pages?

What is inurl:login?

500

If N = 55, the prime factors are?

What are 5 and 11?

500

SIEM stand for

Security Information and Event Management?