A CLI tool commonly used for printing valid ASCII data from a file
What is strings
A simple substitution cipher in which letters are shifted by an offset of 13.
What is Caesar cipher
OR
What is ROT13
A popular physical security tool whose mascot is a dolphin
What is a Flipper Zero
Created by Robert Morris, infected nearly 10% of the internet
What is the Morris Worm
APT widely associated with North Korea and targets mostly banking and financing
What is the Lazarus Group
A control mechanism which reverse engineers try to bypass to get paid software for free such as video games
What is DRM
A french substitution cipher where each letter is offset by the A1-Z26 representation of the key
What is the Vigenère cipher
Tool used for putting tension on the cylinder to allow pin setting
What is Brain
Russian APT Responsible for NotPetya and repeated power grid attacks on Ukraine
What is Sandworm
An anti-reversing technique which malware authors will use to prevent debuggers from gaining introspection on a program
What is anti-debugging
Machine created by the nazis in WWII that was used for encrypting military communications
What is the enigma machine
A type of door which only allows one person through at a time
What is a mantrap
Created after UNIX System V which was not free like its predecessors
What is GNU
U.S. APT believed to be affiliated with the Stuxnet attack on Iran
What is the Equation Group
OR
What is Tailored Access Operations
An anti-reversing technique which causes the software to rewrite itself every time it runs to change its behavior
What is polymorphic code
A public-key cryptosystem which uses the algebraic structure of curves over finite-fields
What is ECC
A wireless system which uses radio waves to communicate identification data from tags to readers
What is RFID
A sophisticated piece of malware that targeted the Natanz Enrichment Complex in Iran to slow down its nuclear programs
What is Stuxnet
Russian APT widely associated with election hacking in 2016 as well as targeting other U.S. government institutions
What is Fancy Bear
In x86-64, what instruction is inserted by debuggers into a running program to specify a breakpoint
What is INT3
OR
What is a software interrupt
A method of key exchange in which a shared secret is created by combining the public key of one party and the private key of another party
What is Diffie-Hellman key exchange
Gaining access to this room is considered one of the hardest things to do in a physical penetration test
What is the server room
A piece of malware targeting Ukraine that went beyond its target and caused approximately $10 billion in damages
What is NotPetya
Group responsible for hacking Idaho National laboratory last week and demanding the lab to research the creation of catgirls.
What is SiegedSec