Famous Hackers
Protocols
Big Numbers
P - Words
IPs and Networks
Crypto
Windows Commands
100

This individual spent 8 months in solitary confinement, because law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone"

Who is Kevin Mitnick

100

Residing on the transport layer, this protocol features reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet

What is Transmission Control Protocol (TCP)

100

One billion has this many zeroes.

What is nine?

100

Unencrypted information is said to be stored in this format

What is plaintext

100

The number of bytes in an IPv4 address

What is 4

100

This simple cipher shifts each character by a given value

     

What is a Caesar cipher (substitution cipher, rotation cipher)

100

This command displays active TCP connections, ports on which the computer is listening, does not resolve IP addresses and lists the processes that opened the connections.

What is netstat -ano

200

This scientist was tasked to track down a .75 cent discrepancy on a dial up phone bill and subsequently discovered the largest cyber attack against the United States. He also wrote a book about it.

Who is Cliff (Clifford) Stoll 

(Cuckoo's Nest)

200

This protocol uses a simple connectionless communication mode, with no handshaking dialogues.

What is User Datagram Protocol (UDP)

200

This is equal to just under 10 trillion kilometers (or about 6 trillion miles).

What is a light year?

200

This attack technique involves fraudulent attempts to obtain sensitive information via email

What is Phishing

200

Private IPv4 addresses were set as a standard in this RFC.

What is RFC 1918

200

This is the effective keysize of the DES cipher

What is 56 bits (7 bytes)

200

This command displays environment variables in a command shell.

What is set

300

This individual released an XSS Worm which became the fastest spreading virus of all time, run by over 1 million users within 20 hours, carrying a payload which read “but most of all, ___ is my hero"

Who is Samy Kamkar

300

This protocol is used for resolution of network layer addresses into link layer addresses

What is Address Resolution Protocol (ARP)

300

Kilo, mega, giga, tera; this is the next consecutive unit in measuring bytes.

What is a petabyte

300

This slag term describes the culture of people who experimented, exposed, and compromised the telephone system

What is Phreaking

300

A netmask of 255.255.255.240 (or /28) has how many usable hosts?

What is 14

300

This cipher was used incorrectly, creating a weakness in the security of WEP

What is RC4

300

This is the command used to remove the hidden attribute from a file or directory. (Please provide correct switch syntax in your response)

What is attrib -h

400

The creator of metasploit.

Who is H.D. Moore

400

This network protocol was designed as a replacement for unsecured remote shell protocols

What is Secure Shell (SSH)

400

A human being's functional memory is estimated to be this large.

What is 1.25 Terabytes

400

This attack technique results in the redirection of legitimate website traffic to another fake website

What is Pharming

400

A technology for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet of a communication session is known as what?

What is IPSec

400

The two fish and three fish ciphers were invented by this crytographer

Who is Bruce Schneier

400

This command communicates with the service controller and installed services.

What is sc

500

This family social engineer said "I have been offered 3 pardons from 3 different standing Presidents and I refused them all because I do not believe that a piece of paper excuses what I did.”

Who is Frank Abagnale

500

This computer networking protocol provides shared access to files, printers, and serial ports, and was later renamed to CIFS.

What is Server Message Block (SMB)

500

This measurement unit is equal to 1000 zettabytes.

What is a Yottabyte

500

This packet has a protocol of 1 and a type of 8

What is ICMP (or Ping)

500

The subnet 224.0.0.0/4 is reserved for what use?

What is IP Multicast

500

This now defunct chipset, utilizing the Skipjack algorithm, was developed promoted by the NSA from 1993-1996 to allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions.

What is the "Clipper chip"

500

This is Microsoft's task automation framework, consisting of a command line shell and associated scripting language built on the .NET framework.

What is PowerShell

600

A legendary phone phreak, this individual became known as "Captain Crunch" after learning that a toy whistle packaged in boxes of Cap'n Crunch cereal emitted a tone of precisely 2600 hertz

Who is John Draper

600

This IPv6 protocol operates at the link layer and is responsible for address autoconfiguration of nodes.

What is Neighbor Discovery Protocol

600

Written in decimal form, this amount looks like this: 1,208,925,819,614,629,174,706,176 , and is equal to 1024 zebibytes


What is a Yobibyte.

600

This popular network attack is (ab)used by the "Circle with Disney" network device for parental control purposes

What is ARP Poisoning (or ARP Spoofing). 

600

This Internet Protocol, written and released on April 1, 1990 in RFC 1149, transmits large amounts of data with high latency and packet loss.

What is Internet Protocol over Avian Carrier (IPoAC)

600

This attack occurs when

What is a collision

600

Which command allows for you to display all file associations from the command-line?

What is assoc