An attack that is formed from active interception or active eavesdropping. Uses a separate computer that accepts traffic from each party in a conversation and forwards the traffic between the two.
What is a Man in the Middle Attack (MITM)
The acronym in the OSI model stands for ___
What is Open Systems Interconnection
This hacking convention, held annually in Las Vegas, is known for its unusual events, including the "Tamper Evident" contest, which challenges participants to defeat various security seals and barriers.
What is DEF CON
Created by a student at Cornell University, was one of the first computer viruses to spread widely on the Internet
What is the Morris Worm
In the movie "The Matrix," what is the name of the character played by Keanu Reeves, who is a computer programmer by day and a hacker by night?
Who is Neo (or Thomas A. Anderson)
String of code embedded into an application or script that will execute in response to an event. The event might be a specific date or time, or a user acton such as when a user launches a specific program
What is a Logic Bomb
The Command that reveals the internet protocol address information of the computer assigned such as DNS, IP address, default gateway, and adapter name regardless if they are active or not.
What is Ipconfig
Early computer network that was utilized in a 1972 demonstration in Washington, D.C to showcase how emails could be sent between two different computer networks
What is ARPnet
In 2008, this hacking group defaced the website of the Church of Scientology, sparking a worldwide controversy.
Who is Anonymous
This 1983 movie, about a hacker who accesses a military supercomputer and nearly triggers World War III, was praised for its portrayal of computer hacking and its potential consequences.
What is WarGames
Criminals who manage botnets. They attempt to infect as many computers as possible and control them through one or more servers running command-and-control software.
Who are bot herders
This may be considered an "IT holiday" that occurs monthly and involves the planning, strategizing, and collaboration of IT personnel from networking, infrastructure, security, and IT governance to harden systems and mitigate vulnerabilities.
What is Patch Tuesday
Created in the early 2000s as a grass-roots campaign originally inspired by hobos in the 1950's
What is Warchalking
In the "Darknet Diaries" episode "The Beirut Bank Job," this group of hackers successfully stole over $100 million from a bank in Lebanon.
Who is the Lazarus Group
This popular video game franchise features a group of hackers known as DedSec, who aim to take down corrupt corporations and government agencies through cyberattacks and hacking.
What is Watch Dogs
This infamous Trojan horse malware was designed to steal banking credentials and is named after a mythological figure known for his cunning and trickery. What is its name?
What is Zeus
The amount of usable hosts on 192.168.2.1/24?
What is 254
First computer password ever created, a nod to a song that was popular among the CTSS development team
What is "tequila"
In 2014, this movie studio suffered a major hack that resulted in the release of unreleased movies, sensitive employee information, and embarrassing emails.
Who is Sony?
In the hit TV show "Mr. Robot," what was the name of the notorious hacker group led by the character Darlene?
What is fsociety
This object, available for retail sale, is capable of injecting dangerous payloads by exploiting how computers handle human interface devices.
What is a Rubber Ducky
The Broadcast Address of 172.30.145.131/25
What is 172.30.145.255
Method of sending unsolicited messages or media files via Bluetooth to other nearby Bluetooth-enabled devices, such as mobile phones or laptops. It was often used for harmless pranks or advertising in the early 2000s before smartphones
What is Bluejacking
An infamous computer virus, named after an "exotic dancer" in Florida, would send an email with salacious offers to the first 50 contacts in their victim's email address. Operated using macros and caused millions of dollars in damages to businesses
What is the Melissa Virus
Alongside computers, the character Phantom Phreak in the 1995 movie "Hackers" exploits a particular object. This activity became a core part of hacker culture starting from the 1950s until the early 2000s and is called ____.
What is Phone Phreaking