Linux Commands
Protocols
Encryption
Computer Architecture
OSINT
100

This command is used to change directories

cd (change directory)

100

SYN -> SYN ACK

ACK

100

Created by a famous roman emperor, this cipher shifts the alphabet by a key between 0 and 26

Caesar Cipher

100
A device that connects computers across multiples LANs. Operates at Layer 3

Router

100

This apple founder sold his 10% stake for less than 1K. It ended up costing him 355 Billion

Ronald Wayne

200

This command is used to display the files in a target directory

ls

200

this protocol is used to send packets to a remote host and wait for a response

ICMP or Ping
200

This type of encryption is one way and cannot be reversed

Hash

200

A layer 2 device that connects computers on a LAN

switch

200
Who was the last president of the UT Cybersecurity Club? (A current board members older brother)

Angelo DeStephano

300

This command is used to tell you where in the file system you are

pwd (print working directory)

300

this protocol is used to insecurely connect to a computer remotely

Telnet

300

The secure version of HTTP

HTTPS

300

Hosts services for other computers to use without wasting their own resources

Server

300

This UT campus dorm supports 17 students.

The Boathouse

400

This command is used to change the permissions of a file

chmod

400

The secure version of Telnet

SSH or Secure Shell

400

Telnet uses this encryption algorithm

None

400

A computer inside of a computer

Virtual Machine

400

On what month did the current president of the Cybersecurity Club pass the Security+ exam

July

500

This command is used to append text to the end of a file

echo >>
500

Replaced by TLS, this protocol was used to secure web traffic

SSL

500

This classification of encryption algorithms have 2 keys, a public and a private

Asymmetric Encryption

500

Ethernet cables use this type of connector

RJ45

500

This is not an OSINT challenge: Decode the message for 1000 points:
84326793747946637

winner