Manual Page
Famous Hackers
potpourri
Cryptography
(Blank)
100

List information about the files

What is ls?

100

This hacker, famously found that a whistle given away in cereal boxes could be used to make free phone calls.

Who is Captain Crunch/John Draper?

100

convert to a numerical IP address 11000000.10101000.00000000.0000000

What is 192.168.0.0?

100

This type of encryption uses the same key for both encryption and decryption.

What is Symmetric-key Encryption?

100

This tool turns Chrome browsers into fully-functional HTTP proxies.

What is Cured Chrome?

200

Provides reference information on topics, such as commands, subroutines, and files.

What is man?

200

DAILY DOUBLE!

This hacker spent eight months in solitary confinement because law enforcement officials convinced a judge that they had the ability to "start a nuclear war by whistling into a pay phone"

Who is Kevin Mitnick?

200

Nmap command option to use specified interface

What is -e?

200

Ron Rivest, Adi Shamir, and Leonard Adleman created this cryptosystem

What is the RSA?

200

Protocol that exposes application objects via remote procedure calls (RPCs) and consists of a set of extensions layered on the Microsoft Remote Procedure Call Extensions.

What is DCOM?

300

full-screen window manager that multiplexes a physical terminal between several processes

What is screen?

300

Created the first computer worm to receive significant media attention and led to the first felony conviction under the Computer Fraud and Abuse Act.

Who is Robert Morris?

300

This technique exploits the Windows search order for DLLs to load a malicious DLL into a legitimate application's memory space

What is dll side loading?

300

This attack targets hash functions by finding two different inputs that produce the same hash output.

What is a Collision Attack?

300

Entra/Azure option that will enforce MFA by forcing new users to sign up for any method of MFA that is supported within the tenant.

What is Require Microsoft Entra ID multifactor authentication registration 

400

utility used to list, or edit and re-execute, commands previously entered to an interactive shell.

What is fc?

400

This early computer scientist and mathematician is credited with developing the first compiler.

Who is Grace Hopper?

400

The process of taking data structured in some format and rebuilding it into an object

What is Deserialization?

400

A sequence where each number is the sum of the two numbers before it.

What is Fibonacci sequence?

400

DAILY DOUBLE!

This technique involves manipulating the control flow of a program by exploiting vulnerabilities in just-in-time compilation engines.


What is a JIT Spraying Attack?

500

Generates random permutations from input.

What is shuf?

500

In 1983, this 17-year-old hacked into ARPANET, the Pentagon’s computer network.

Who is Kevin Poulsen?

500

Name the exploit type.

import struct
pad = "\x41" * 76
EIP = struct.pack("I", 0xbffff780)
shellcode = "\x31\xc0\x31\
NOP = "\x90" * 100
print pad + EIP + NOP + shellcode

What is Buffer Overflow?

500

This protocol allows two parties to authenticate each other and establish a secure channel without relying on a pre-shared secret.

What is the Needham-Schroeder Protocol?

500

EIP overwrite is used to bypass this protection

What is Address space layout randomization (ASLR)