Hacking
Linux
Laws & Ethics
What-cha-ma-call-it
misc.
100

creative problem solving used to gain unauthorised access to or control over a computer system

What is HACKING?

100
The name of the Linux distribution we used in this camp

What is Kali?

100

A branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.

What is DIGITAL FORENSICS?
100

This is the word for the metadata stored in digital images

What is EXIF?

100

The "weakest link" in any computer system

What are PEOPLE?

200

The most common reason hackers hack

What is money/financial gain?

200

The Linux command used to list the contents of a directory

What is ls?

200

Under the 1986 federal Computer Fraud and Abuse Act (CFAA), this is the maximum prison sentence that can be imposed

What is 10-20 years?

200

This is a job title for someone hired by a company to test system security (a type of White Hat hacker)

What is a PEN TESTER?

200

When a hacker gains access to a computer or network and considers the system to be owned or dominated.

What is "Pwning"?

300

In the 1960's and 1970's some people would hack into telecommunications systems, especially to obtain free calls.

What is PHREAKING?

300

the type of path name used to describe the location of a file or folder in Linux which starts from the root directory

What is an ABSOLUTE PATH?

300

In order to comply with federal laws, police must get this before they can examine a user's cell phone data.

What is a warrent?

300

This type of cryptomalware attack which affected both UCSF and Garmin recently is very much on the rise.

What is RANSOMWARE?

300

This is the most common mobile OS. It is based on Linux.

What is Android OS?

400

Hackers without knowledge; use tools & attempt to hack

What are SCRIPT KIDDIES?

400
This is how you make a file or directory "invisible" in Linux

What is using a . at the beginning of the name?

400

This is a bit-for-bit copy of a hard drive made by investigators to examine so that the original stays unaltered

What is a (disk) image?

400

A container that prevents a cell phone inside from receiving external cell signals

What is a Faraday bag (or box or cage)?

400

One type of Ethical Hacking is finding weaknesses/bugs/vulnerabilities in software or systems and reporting them to the company for a reward.

What is a BUG BOUNTY?

500

The Decade in which the first computer worm was created

When was the 1980s?

500

Linux operating system, created by Linus Torvalds, is open-source software based on what previous OS?

What is UNIX?

500

The hacker who leaked highly classified information from the National Security Agency (NSA) in 2013.

Who is Edward Snowden?

500

A controlled and restricted environment for programs or code where it can run with minimal risk of causing widespread damage to the system (it can be used to safely isolate/identify of malware)

What is a SANDBOX?

500

Social Engineering--manipulating people to reveal information or do something they wouldn't otherwise do--works for reasons such as this

What is (name any of these) Authority/Intimidation/Consensus/Scarcity/Urgency/Promise of a Reward?