Malware and Web Security
Linux commands
MACs and IPs
Networking
Potpourri
100

How are stateful and stateless firewalls different?

Stateless: fixed set of rules to follow; static

Stateful: monitors behavior on active connections; dynamic

100

Command (and flag!) for showing hidden files in a directory

ls -a

100

What is the valid range of numbers that may appear as part of an IPv4 address?

0-255

100

What does DNS stand for, and what does it do?

Domain Name System, relates text URLs to IP addresses

100

Derek says "data sent over HTTPS is encrypted." Anh says "nah bro, it's hashed."

Who's right, and why?

Tariq is - encrypted content can be un-encrypted by the recipient, but hashed content cannot ever be un-hashed.

200

How are viruses and worms different?

Viruses require a host to spread (like an infected email attachment); worms can propogate and spread themselves.

200

What does the "file" command do?

Displays information about the file, most notably its type

200

What information is stored in the first 6 digits of a MAC address?

Manufacturer of the computer's NIC (network interface card)

200

What are the default port numbers for HTTP and HTTPS?

80 and 443

200

How is a switch different from a router?

A switch can send packets between computers on a LAN; routers can convert between IP configurations and pass packets between networks.

300

Why is logging crucial for mitigating attacks on systems, when it cannot prevent or detect intrusion?

Logs keep track of actions taken by bad actors to help harden the system against future attacks.

300

Linux command for searching for text within a file

grep

300

Why are MAC addresses considered "physical" and IPs considered "logical" addresses?

MACs are embedded into the physical firmware of a network card, whereas IPs are dynamic and determined algorithmically (a.k.a. "logically")

300

What's a PAN network? Give an example pls!

Personal Area Network; your AirPods connecting to your phone, or NFC when paying with Apple Pay or a tap credit card

300

What is a "SOHO" network?

Small Office/Home Office; usually small company networks managed in-house (and thus vulnerable to attacks!)

400

What is the "back end" of a website, and which type of web attack targets it?

Where a website's database is held and managed, targeted by SQL injection
400

"cat" prints file contents to a terminal. What is "cat" short for?

concatenate

400

Describe the role of DHCP in networking.

Dynamic Host Configuration Protocol; used by the router to assign IPs to computers on the network.

400

How do VLANs and subnets improve security?

Subnets are separated from each other, helping contain malicious networking activity

400

Name the purpose of the two reserved IPs on a network (.0 and .255)

.0 is for the router ("network address") .255 is "broadcast" i.e. messages sent to every computer on the network

500

Describe the difference between a fork bomb and a zip bomb.

Fork bombs recreate themselves until RAM is overwhelmed; zip bombs expand files until "hard disk" storage space is overwhelmed.

500

What is the point of "piping" a command into less? For example: cat myfile.txt | less

Makes the contents of long files scrollable in the terminal

500

Why must you often spoof a MAC before spoofing an IP on a network?

The router won't give you a new IP unless your MAC has changed (and you appear to be a new computer)

500

Name three pieces of information stored in a typical networking packet.

Source IP, Destination IP, Data, TTL, version number, length, source/dest port, flags...

500

Describe how a "MAC flood" works.

Use ARP to fill a router's CAM table with too many MAC/IP addresses; cause the router to "fail open" and potentially leak information or behave erratically.