Keep A Secret?
We Attack At Dawn!
Pass-Port
Hackronyms
A Five "Tool" Player
100

The process of concealing code or text inside a graphical image

What is Steganography?

100

A cyberattack where scammers use text messages to trick people into revealing sensitive information

What is SMiShing?

100

A protocol for secure remote login and command execution, ensuring encrypted communications for remote administration. Protocol and Port.

What is SecureShell - 22?

100

One of the two main IPSec protocols, it provides encryption, integrity, and authentication 

What is (ESP) Encapsulating Security Payload?

100

A method or tool that can be used to detect and study attackers after they have successfully infiltrated a network.

What is a honeypot?

200

DAILY DOUBLE - A defensive strategy designed to prevent rogue endpoints from connecting to network infrastructure

What is Port Security?

200

A software vulnerability where a program writes more data to a temporary memory storage area than it can hold - corrupting data, crashing programs, or allowing attackers to inject malicious code

What is Buffer Overflow?

200

It provides remote shell access over TCP and offers no encryption, transmitting in plain text. 

What is Telnet - 23?

200

A strategy and set of tools designed designed to detect, monitor, and prevent the unauthorized transmission or exposure of sensitive data

What is (DLP) Data Loss Prevention?

200

A security alerting and monitoring tool that collects system, application, and network logs from multiple sources in a centralized system

What is a (SIEM) Security Information and Event Management?

300

The process of adding a random character string to a password to prevent a hacker from cracking it

What is Salting?

300

An attack in which web services may appear to be up and available, but a sudden spike in network traffic causes them to be inaccessible by the public

What is DoS or DDoS (Denial or Distributed Denial of Service)?

300

A protocol for sharing files, printers, and other network resources among computers, primarily in Windows environments.

What is SMB - 445?

300

DAILY DOUBLE - It defines how much data loss an organization can tolerate during a disaster

What is (RPO) Recovery Point Objective?

300

As part of a DRP it aids in recovery while keeping costs to a minimum and may have an RTO of days or weeks

What is a Cold Site?

400

An encryption method in which the same key is used to both encrypt and decrypt a message sent to a coworker or peer

What is Symmetric Encryption?

400

DAILY DOUBLE - In digital forensics, the contents of this are considered the most volatile and should be collected first.

What is RAM?

400

A standardized protocol for forwarding log messages in an IP network, enabling centralized logging of events from various systems and network devices.

What is Syslog - 514? 

400

A structured process used to design, develop, test, and maintain high-quality software efficiently and cost-effectively

What is (SDLC) Software Development Life Cycle?

400

Host discovery and port/service/OS scanner for security auditing and network inventory.

What is nmap?

500

Released in 1962, it was the first James Bond movie to star Sean Connery.

What is Dr. No?

500

A great leader who invented the "Buffalo Horns" battlefield formation, consisting of Chest, Horns, and Loins components that revolutionized combat in the 19th century

Who is Shaka Zulu?

500

He owns the NFL's career interception record with 336 thrown. Averaging over 1 per game.

Who is Brett Favre? 

500

Released in 2001, it starred John Travolta and Don Cheadle. It follows the hacking adventures of Stanley Jobson and his "hydra". Its iconic opening bank-heist scene was filmed using 135 cameras to capture a 360 degree effect

What is Swordfish?

500

He holds the MLB career singles record with 3,299 hit.

Who is Ty Cobb?