A connection-oriented protocol that requires reliable delivery of data
What is TCP?
This type of cryptography uses the same key for both encryption and decryption.
What is symmetric encryption?
In 2017, this ransomware attack infected hundreds of thousands of computers worldwide, demanding payment in bitcoin.
What is WannaCry?
This tool is a classic network scanner used to discover hosts and services on a network
What is Nmap?
In this type of attack, a hacker floods a network, server, or website with excessive traffic to make it unavailable to legitimate users.
What is a Denial-of-Service attack?
A connectionless, high-speed protocol that does not ensure delivery of data
What is UDP?
This system uses a public key to encrypt data and a private key to decrypt it.
What is RSA?
In 2000, this computer virus spread worldwide via email with a very affectionate subject line, causing billions in damage.
What is the ILOVEYOU virus?
This tool allows you to intercept, inspect, and modify HTTP and HTTPS traffic between a client and a server.
What is Burp Suite?
This attack tricks users into running malicious programs by disguising them as legitimate software or updates.
What is a trojan?
The primary purpose of this protocol is to translate human-readable domain names into IP addresses.
What is DNS?
This algorithm allows two parties to agree on a shared secret over an insecure channel without transmitting the secret itself.
What is Diffie-Hellman?
In 2017, this malware targeted industrial systems and was notable for its ability to cause physical damage Iranian nuclear centrifuges.
What is Stuxnet?
This password cracking tool is known for its speedy brute force style, supporting hundreds of hash types.
What is Hashcat?
This advanced attack involves exploiting a previously unknown vulnerability in software or hardware, often used in high-profile nation-state attacks.
What is a zero-day attack?
In SMTP, this command can used by clients to request a server's supported extensions.
What is EHLO?
In HTTPS, this cryptographic protocol negotiates encryption algorithms and keys between client and server.
What is TLS?
First sighted in 2004, this computer worm became the fastest-spreading e-mail worm ever, with a text message reading "Andy; I'm just doing my job, nothing personal, sorry,".
What is Mydoom?
This open-source OSINT tool checks hundreds of social media platforms to determine whether a username exists across multiple sites.
What is Sherlock?
In this type of attack, attackers manipulate network traffic to redirect users to malicious websites or steal sensitive data without their knowledge.
What is DNS spoofing?
In DNS, when a server returns a referral to another server contact instead of a final answer, it is responding to this type of query.
What is an iterated DNS query?
This property of a cryptographic system ensures that even if a long-term key is compromised, past communications stay secure.
What is perfect forward secrecy?
Released in 1988, this worm is one of the first to be released across the early internet, infecting thousands of computers and causing significant disruption.
What is the Morris worm?
this high-speed network scanner can scan the entire IPv4 address space in minutes by using asynchronous packet transmission and its own custom TCP/IP stack.
What is Masscan?
This local network attack involves sending forged ARP messages to associate the attacker's MAC address with another device's IP address.
What is ARP poisoning?