List information about the files
What is ls?
This hacker, famously found that a whistle given away in cereal boxes could be used to make free phone calls.
Who is Captain Crunch/John Draper?
convert to a numerical IP address 11000000.10101000.00000000.0000000
What is 192.168.0.0?
This type of encryption uses the same key for both encryption and decryption.
What is Symmetric-key Encryption?
This tool turns Chrome browsers into fully-functional HTTP proxies.
What is Cured Chrome?
Provides reference information on topics, such as commands, subroutines, and files.
What is man?
DAILY DOUBLE!
This hacker spent eight months in solitary confinement because law enforcement officials convinced a judge that they had the ability to "start a nuclear war by whistling into a pay phone"
Who is Kevin Mitnick?
Nmap command option to use specified interface
What is -e?
Ron Rivest, Adi Shamir, and Leonard Adleman created this cryptosystem
What is the RSA?
Protocol that exposes application objects via remote procedure calls (RPCs) and consists of a set of extensions layered on the Microsoft Remote Procedure Call Extensions.
What is DCOM?
full-screen window manager that multiplexes a physical terminal between several processes
What is screen?
Created the first computer worm to receive significant media attention and led to the first felony conviction under the Computer Fraud and Abuse Act.
Who is Robert Morris?
This technique exploits the Windows search order for DLLs to load a malicious DLL into a legitimate application's memory space
What is dll side loading?
This attack targets hash functions by finding two different inputs that produce the same hash output.
What is a Collision Attack?
Entra/Azure option that will enforce MFA by forcing new users to sign up for any method of MFA that is supported within the tenant.
What is Require Microsoft Entra ID multifactor authentication registration
utility used to list, or edit and re-execute, commands previously entered to an interactive shell.
What is fc?
This early computer scientist and mathematician is credited with developing the first compiler.
Who is Grace Hopper?
The process of taking data structured in some format and rebuilding it into an object
What is Deserialization?
A sequence where each number is the sum of the two numbers before it.
What is Fibonacci sequence?
DAILY DOUBLE!
This technique involves manipulating the control flow of a program by exploiting vulnerabilities in just-in-time compilation engines.
What is a JIT Spraying Attack?
Generates random permutations from input.
What is shuf?
In 1983, this 17-year-old hacked into ARPANET, the Pentagon’s computer network.
Who is Kevin Poulsen?
Name the exploit type.
import struct
pad = "\x41" * 76
EIP = struct.pack("I", 0xbffff780)
shellcode = "\x31\xc0\x31\
NOP = "\x90" * 100
print pad + EIP + NOP + shellcode
What is Buffer Overflow?
This protocol allows two parties to authenticate each other and establish a secure channel without relying on a pre-shared secret.
What is the Needham-Schroeder Protocol?
EIP overwrite is used to bypass this protection
What is Address space layout randomization (ASLR)