Networking Basics
Protocols in Action
The Adversary
Scanning & Recon
Exploitation
100

This 7-layer conceptual framework includes layers like Application, Transport, and Physical.

What is the OSI Model?

100

The protocol that uses the four-step DORA process to automatically assign IP addresses.

What is DHCP?

100

This pillar of the CIA Triad ensures that systems are online and accessible to authorized users.

What is Availability?

100

The Nmap switch used to perform a "ping scan" for host discovery without port scanning.

What is -sn?

100

The two golden rules of ethical hacking are to get written permission and to stay within this.

What is the scope?

200

The permanent, 48-bit hardware address burned into a network card.

What is a MAC Address?

200

This connectionless protocol is favored for its speed in applications like DNS lookups and online gaming.

What is UDP?

200

An attacker who uses pre-made tools and scripts without fully understanding them, often motivated by ego.

Who is a Script Kiddie?

200

A unique identifier, such as CVE-2021-44228, for a publicly known vulnerability.

What is a CVE?

200

The Metasploit module that contains the code that takes advantage of a specific vulnerability.

What is an Exploit?

300

This protocol uses port 22 for secure remote command-line administration.

What is SSH (Secure Shell)?

300

The most secure and modern Wi-Fi encryption standard.

What is WPA3?

300

The stage of the Cyber Kill Chain where an attacker creates a malicious payload, such as a backdoored PDF file.

What is Weaponization?

300

The Nmap switch that enables "aggressive" mode, turning on OS detection, version detection, and script scanning.

What is -A?

300

A type of payload that makes the victim machine connect back to a listener on the attacker's machine.

What is a Reverse Shell?

400

The process of dividing a large network into smaller ones, often using CIDR notation like /26.

 What is Subnetting?

400

The three packets, in order, that make up the TCP three-way handshake.

What are SYN, SYN/ACK, and ACK?

400

A threat actor, such as a disgruntled employee, who abuses their legitimate access to harm an organization.

Who is an Insider Threat?

400

The scoring system from 0.0 to 10.0 used to rate the severity of a vulnerability.

What is CVSS (Common Vulnerability Scoring System)?

400

The ' OR 1=1 # string is a classic payload for this type of web application attack.

What is SQL Injection?

500

The service on a router that translates between one public IP and many private IPs.

What is NAT (Network Address Translation)?

500

The type of Wi-Fi security used in businesses that requires a unique username and password for each user, authenticated by a RADIUS server.

What is WPA2/WPA3-Enterprise?

500

This framework, managed by MITRE, is a comprehensive knowledge base of adversary tactics, techniques, and procedures (TTPs).

What is the ATT&CK framework?

500

A type of vulnerability scan where the scanner has login credentials, allowing it to perform much more accurate, in-depth local checks.

What is an Authenticated (or Credentialed) Scan?

500

Metasploit's advanced, in-memory payload that is stealthy and provides a wide range of post-exploitation capabilities.

What is Meterpreter?