What kind of data are you analysing from a .pcap file
network traffic data
What is the full name of the error code 404
404 Not Found
What does csv stand for
Comma Separated Values
What is the encryption used here? UlZDVEZ7SmVvcGFyZHlCb25kaW5nIX0=
base64
Whats RVCTF's instagram @
rv.ctf
What is commonly used command to read the metadata of a file
exiftool
What does XSS stand for?
Cross Site Scripting
What python library is commonly used when working with tables and data frames
Pandas
This cipher replaces each letter with letter a fixed number of places in the alphabet ahead.
What is this cipher
Caesar cipher
Which teacher is in charge of RVCTF (full name)
Mr Chan Him Nok
name 3 password cracking tools
hydra, john the ripper, hashcat
You see a URL like this: https://example.com/page.php?id=1.
What kind of vulnerability should you test for?
SQL Injection or IDOR (Insecure Direct Object Reference)
What function is used to remove NaN values for pandas?
dropna()
Describe what XOR does
It compares two input bits and generates one output bit if the bits are the same, the result is 0 if the bits are different, the result is 1
Whats the current RVCTF president's full name
LIANG JUN CHENG, AARON
You’re given a .zip file that’s only a few KB, but extracting it crashes your system or causes high resource usage, what is this file called?
A ZIP bomb
What is the purpose of a robots.txt file on a website?
It tells web crawlers (like search engine bots) which pages or directories they are allowed or disallowed to crawl.
Which scikit-learn function splits your dataset into training and testing sets?
train_test_split()
How does the keys in RSA work?
One key encrypts the plaintext into cipher text and the other key decrypts the cipher text into plaintext
What year was RVCTF founded
2022
What is the file signature for a PNG file
89 50 4E 47 0D 0A 1A 0A
What’s the difference between stored XSS and reflected XSS?
Stored XSS is saved on the server and shown to all users; reflected XSS is in the URL/request and affects only the person who clicks the link.
What does random_state affect?
Ensures that the same data points are assigned to each set every time the code is run
Why must prime numbers in generating RSA keys be far apart
So that the attacker is unable to use Fermat’s factorisation method to find the key
Whats the name of the first president of CTF
Guan Chen Di