What is the open source hash cracking tool that popularized GPU acceleration?
Hashcat
What does the symbol “|” stand for in Powershell/Bash and what is its purpose?
Pipe/Pipeline, pass output to another command
How did threat actors gain initial access to Colonial Pipeline in the 2021 cyber attack?
Stale VPN account, no MFA, possible password reuse from dark web
Secure Shell
TCP 22
What two primary factors determine risk?
Impact and Likelihood
What is the name of the popular open source tool used to dump cached Windows credentials from memory?
mimikatz
How can you show current running processes on a Linux system in Bash?
ps, top/htop, ls /proc
What is the term coined for calling many different phone numbers to find live modems?
War dialing
Server Message Block
TCP 445
What are the three types of authentication?
Something you are, know, and have
What kind of attack was LOIC, made popular by Anonymous, used for?
DDoS
How would you find the version of Powershell you are using from Powershell?
$psversiontable, Get-Host, $host
Who is the cryptanalyst famous for allowing the Allies to break Axis encryption during WWII?
Alan Turing
Windows Remote Desktop Protocol
TCP/UDP 3389
In the context of Windows Security Events, what does Logon Type 10 represent?
RemoteInteractive – RDP or Remote Assistance
What is the default Nmap TCP scan type?
SYN scan, half open scan
What Windows CMD command shows currently logged in users?
query session, query user
What is the name of the SMB exploit developed by the NSA that was leaked and used by WannaCry ransomware?
EternalBlue
Internet Key Exchange
UDP 500
In the context of vulnerabilities, what does RCE stand for?
Remote Code Execution
Who maintains Metasploit and what language is it written in?
Rapid7, Ruby
What the default filesystem path of the Powershell binary?
C:\Windows\System32\WindowsPowershell\1.0\powershell.exe
What software was exploited to gain initial access to Equifax in 2017?
Apache Struts
Session Initiation Protocol
TCP/UDP 5060
Why is stored XSS more dangerous than reflected XSS?
Code is kept in web app and loaded automatically vs requiring user interaction