Hardware & Virtual
Exploitation
Forensics
Linux
Windows
100

"This type of memory is volatile and loses data when power is lost"

What is RAM

100

This phase of exploitation involves gathering information about a target system

What is reconnaissance (or information gathering)?

100

"This is the first stage of incident response where you determine if an incident has occurred"

"What is identification (or detection)?"

100

"This command displays the contents of a file in Linux"

 "What is cat?"

100

"This Windows CLI command displays directory contents",

"What is dir?"

200

This hardware component is responsible for executing instructions and performing calculations"

What is the CPU (Central Processing Unit)?

200

This type of attack overwrites memory to inject malicious code

What is a buffer overflow?

200

"This volatile artifact contains running processes and network connections"

"What is RAM (or memory)?"

200

"This permission bit allows a file to be executed"

"What is the execute permission (or x)?"

200

This Windows file contains password hashes for local accounts",

"What is SAM (Security Account Manager)?"

300

This virtualization technology is lighter-weight than VMs and shares the host OS kernel

What are containers (or Docker)?

300

This tool framework is commonly used for developing and executing exploit code

What is Metasploit?

300

"This type of forensics investigation focuses on determining what happened after a security breach"

"What is incident response (or post-mortem investigation)?"

300

"This Linux command changes file permissions using numeric or symbolic notation"

"What is chmod?"

300

"This Windows command displays network configuration information"

"What is ipconfig?"

400

This type of hypervisor runs directly on hardware without a host OS

What is a Type 1 (or bare-metal) hypervisor?

400

This mitigation technique randomizes memory addresses to prevent exploitation

What is ASLR (Address Space Layout Randomization)?

400

"This forensic artifact in Windows tracks recently accessed files and applications

"What is prefetch (or prefetch files)?"

400

"This file contains the user account information in Linux"

"What is /etc/passwd?"

400

"This Windows permission allows users to modify file contents but not delete them"

"What is Modify (or Write) permission?"

500

This advantage of virtualization allows multiple OS instances to run on a single physical machine

What is resource consolidation (or server consolidation)?

500

This post-exploitation technique involves escalating from a normal user to administrator

What is privilege escalation?

500

"This post-exploitation goal involves moving from one compromised system to another in the network"

"What is lateral movement?"

500

"This command shows active network connections and listening ports in Linux"

"What is netstat (or ss)?"

500

"This Windows networking feature allows name resolution without DNS"

"What is NetBIOS (or WINS)?"