Microwave DDoS
Speak to me
Paper Pony
Who are you?
What's that number?
100

What is the acronym "WAP"

Wireless Access Point

100

What is the acronym "HTTP"

Hyper Text Transfer Protocol

100

What is the acronym "IOC"

Indicator of Compromise

100

This is the term to describe social engineering online

Phishing

100

404

Not Found

200

What is the acronym "PSK"

Pre-Shared Key

200
What is the acronym "TCP"

Transmission Control Protocol

200

This malware disguised as a virus is named after the huge hollow horse used by the greeks to infiltrate Troy

Trojan Horse/RAT

200

Social engineering a HIGH value or person of interest online

Whaling

200

200

Ok

300

What is the acronym "WPA" 

WiFi Protected Access

300

What is the acronym "UDP"

User Datagram Protocol

300

This is central hub for an attacker, often used to control botnets

C2/C&C

300

A common attack scheme where the attacker places themselves between a client and the intended target

Man In The Middle

300

500

Internal Server Error

400

This WiFi frequency is known for longer ranges in exchange for lower data rates

2.4GHz

400

This is the 4th layer of the OSI model 

Transport Layer
400

This is a term used to describe threat groups of particular stature or power in cyber terrorism

Advanced Persistent Threat

400

A type of encoding often used for HTML and CSS and produces an ASCII string format by translating the data into a radix-64 representation 

Base64

400

301

Moved Permanently

500

This is the process that happens when a client authenticates with a access point

4 Way Handshake

500

This is a program that allows you to modify your HTTP requests via capturing the request using a proxy, in which you can use many modules to modify packets

Burpsuite

500

This is a center for sharing online threat knowledge and tactics 

Information Sharing and Analysis Center

500
[DAILY DOUBLE]

Name at least three different types of SHA hashing algorithm

Accepted Answers: SHA0, SHA1, SHA224, SHA256, SHA384, SHA512, 

500

403

Forbidden