Microsoft centralized database for oragnization administration and an attack where an attacker exploits a web application's vulnerability to access files outside of the intended web root
What is Active Directory traversal?
This Windows tool shows running processes, services, and performance statistics
What is Task Manager?
This popular open‑source framework is used for penetration testing, vulnerability validation, and exploit research
What is Metasploit?
print("Hello, World")
What is Python?
My favorite operating system
What is Windows 10? Also acceptable - Hannah Monatana Linux or Temple OS
Exploit taking advantage of Windows SMBv1 (used in WannaCry) and common windows issue leading to unrecoverable damage
What is Eternal Blue screen of death?
This directory primarily contains this type of files system files (executables, DLLs, drivers)
What is C:\Windows\System32?
This tool is used for automated testing of SQL injection vulnerabilities
What is SQLmap?
package main
import "fmt"
func main() {
fmt.Println("Hello, World")
}
What is Go (Golang)?
This game consumes too much of my life
What is League of Legends or Destiny 2?
Tools used for connecting and enumerating SMB shares and a programming model where a computer or program provides services and another requests services from it
What is smbclient server model?
This is the default file system used for most modern installations
What is NTFS?
This software is a suite of tools used for web testing, including a proxy and repeater to resend web requests
What is BurpSuite?
with Ada.Text_IO; use Ada.Text_IO;
procedure Hello is
begin
Put_Line("Hello, World");
end Hello;
What is ada?
What is CT Judicial Branch?
Unsecured TCP connection and an open-source, powerful network service exploitation tool designed to automate security assessments of large networks
What is telnet exec?
Windows Defender relies on this virtualization-based technology to isolate parts of the operating system, often used in Credential Guard
What is Hyper-V?
This tool is popularly used for brute-force attacks
What is Hydra?
main :: IO ()
main = putStrLn "Hello, World"
What is Haskell?
My favorite sorting algorithm
File in Linux which stores hashed and salted password and the name of the group attributed the leaks to the Equation Group threat actor, who have been tied to the NSA's Tailored Access Operations unit
What is /etc/shadow brokers?
This Windows security feature checks the integrity of drivers and kernel modules before loading them at boot
What is Secure Boot / Driver Signature Enforcement?
This tool is popularly used for password cracking
What is JohnTheRipper?
\documentclass{article}
\begin{document}
Hello, World
\end{document}
What is Latex?
The topic of my honors thesis
What is digital forensic analysis of eBay on Android?