Before and After
Windows
Tools
Who's that programming language again?
It's me mark
100

Microsoft centralized database for oragnization administration and an attack where an attacker exploits a web application's vulnerability to access files outside of the intended web root 

What is Active Directory traversal?

100

This Windows tool shows running processes, services, and performance statistics

What is Task Manager?

100

This popular open‑source framework is used for penetration testing, vulnerability validation, and exploit research

What is Metasploit?

100

print("Hello, World")

What is Python?

100

My favorite operating system

What is Windows 10? Also acceptable - Hannah Monatana Linux or Temple OS

200

Exploit taking advantage of Windows SMBv1 (used in WannaCry) and common windows issue leading to unrecoverable damage

What is Eternal Blue screen of death?

200

This directory primarily contains this type of files system files (executables, DLLs, drivers)

What is C:\Windows\System32?

200

This tool is used for automated testing of SQL injection vulnerabilities

What is SQLmap?

200

package main

import "fmt"

func main() {

    fmt.Println("Hello, World")

}

What is Go (Golang)?

200

This game consumes too much of my life

What is League of Legends or Destiny 2?

300

Tools used for connecting and enumerating SMB shares and a programming model where a computer or program provides services and another requests services from it

What is smbclient server model?

300

This is the default file system used for most modern installations

What is NTFS?

300

This software is a suite of tools used for web testing, including a proxy and repeater to resend web requests

What is BurpSuite?

300

with Ada.Text_IO; use Ada.Text_IO;

procedure Hello is

begin

    Put_Line("Hello, World");

end Hello;

What is ada?

300
My internship this previous summer

What is CT Judicial Branch?

400

Unsecured TCP connection and an open-source, powerful network service exploitation tool designed to automate security assessments of large networks

What is telnet exec?

400

Windows Defender relies on this virtualization-based technology to isolate parts of the operating system, often used in Credential Guard

What is Hyper-V?

400

This tool is popularly used for brute-force attacks

What is Hydra?

400

main :: IO ()

main = putStrLn "Hello, World"


What is Haskell?

400

My favorite sorting algorithm

What is quantum bogo sort?
500

File in Linux which stores hashed and salted password and the name of the group attributed the leaks to the Equation Group threat actor, who have been tied to the NSA's Tailored Access Operations unit 

What is /etc/shadow brokers?

500

This Windows security feature checks the integrity of drivers and kernel modules before loading them at boot

What is Secure Boot / Driver Signature Enforcement?

500

This tool is popularly used for password cracking

What is JohnTheRipper?

500

\documentclass{article}

\begin{document}

Hello, World

\end{document}

What is Latex?

500

The topic of my honors thesis

What is digital forensic analysis of eBay on Android?