Phishy Business
Hackers Gonna Hack
Patch Me If You Can
Kali Me Maybe
Hackers with Benefits
100

What would raise an alarm in this email address from “Microsoft”?

msonlineservices@microsfrtfonline.com

MISPELLINGS

100

These hackers wear white hats -- not for fashion -- but because they try to protect systems, not break them.

ETHICAL HACKERS

100

This common vulnerability results from not validating user input, allowing attackers to run arbitrary SQL commands on a database

SQL

100

*WILDCARD*

What is the command to list out all of the files in a directory?

LS

100

Design algorithms and ciphers to make networks more secure


CRYPTOGRAPHER

200

*WILDCARD*

What is the common tactic used in phishing which manipulates victims into acting quickly without fully considering the legitimacy of the request?

SENSE OF URGENCY

200

Who was the hacker who discovered the WannaCry kill switch, stopping one of the world’s worst cyberattacks at the time?




MARCUS HUTCHINS

200

*WILDCARD*

Regularly updating your software helps protect against these, which are flaws or weaknesses that hackers can exploit.

VULNERABILITY

200

Name a common text-editor found on Kali systems.

Options: vi, vim, nano, kate, GNOME text editor, gedit

200

Manage, maintain, and secure database systems.

DATABASE ADMINISTRATOR

300

You get a text from your ‘bank’ asking to click a link to verify your account. What is this mobile phishing technique called?

SMS PHISHING or SMISHING


300

This ‘hacktivist’ group is known for wearing Guy Fawkes masks and saying ‘We are Legion’

ANONYMOUS

300

This automatic feature in many operating systems helps keep your device secure by installing the latest security patches without needing user action.

AUTOMATIC UPDATES

300

What command is user to remove all the files in a directory and all its subdirectories?

RM -R

300

*DOUBLE JEOPARDY*

Professionals who stimulate cyber attacks to find vulnerabilities and weaknesses.

PENTESTER

400

A fake website that looks identical to your email login page is called this.

SPOOFED SITE

400

*DOUBLE JEOPARDY*

This 2014 hack leaked emails, movies, and personal data from a major movie film studio, allegedly in retaliation for a movie mocking North Korea

SONY PICTURES HACK

400

This type of vulnerability is caused when a program tries to store more data in a buffer than it can hold, often leading to crashes or exploitable code execution.

BUFFER OVERFLOW

400

What command would you use to output the sorted version of a file?

SORT

400

Actively search for lateral threats within the network or advanced threats like APTs.

THREAT HUNTERS

500

*WILDCARD*

The FBI calls this “Business Email Compromise’ -- what do we call it when scammers pretend to be the CEO and trick employees in wiring money?

hint: also is a homonym with a type of whale hunting technique

SPEAR PHISHING

500

This sophisticated cyberattack targeted Iranian nuclear facilities using a weaponized computer worm.

STUXNET

500

This Microsoft vulnerability, famously exploited by the WannaCry ransomware in 2017, was patched in MS17-010 and targeted the SMB protocol.

EXTERNAL BLUE

500

*DOUBLE JEOPARDY*

How do you create a symbolic link between files?

LN -S

500

Maintain the integrity of Layer 2 and Layer 3 operations.

NETWORK ADMINISTRATORS