Red
White
Purple
Blue
Double or Nothing
100

This attack consists of an attacker using automated scripts to try out possible passwords until the correct one works. They are very time consuming because they take a systematic approach to trying all possible permutation of characters in a sequence. The longer the password, the longer it takes.

What is a Brute-Force Attack?

100

According to the CompTIA A+ exam, RAID stands for this.

What is Redundant Array of Independent Disks?

100

This is a group of internet-connected devices, each of which are used to perform attacks, steal data, send spam, and allow the attack to access the device and its connection.

What is a botnet?

100

This c word is a formal synonym of the verb "guess" that means "to form an opinion or idea without proof or sufficient evidence."

What is conjecture?

100

*** DAILY DOUBLE ***

This is a malicious type of software or hardware designed to track every keystroke and report it back to a hacker. Typically, a user will download a software believing it to be legitimate, only for it to install this.

What is a keylogger?

200

This attack consists of an attacker putting lists of commonly used passwords into attack dictionaries. Threat actors typically use automated scripts to match the original password with the suggestions from the gathered attack dictionary.

What is a Dictionary attack?

200

This RAID level stripes data evenly across two or more disks to increase performance, but provides no fault tolerance or redundancy.

What is RAID 0?

200

his set of tools and techniques that attackers use to maintain communication with compromised devices following their initial exploitation is known as this.

What is Command and Control (C2)?

200

This e word means "of or relating to the regions beyond the earth" or "of or resembling heaven." It can also mean "lacking material substance" and "relating to, containing, or resembling a chemical ether."

What is ethereal?

200

*** DAILY DOUBLE ***

This s word refers to a place or state in which there is great confusion, disorder, or destruction.

What is shambles?

300

With this attack, bad actors take advantage of the tendency for users to reuse the same usernames and passwords for multiple accounts. By using credentials exposed in data breaches, the automate the process of trying those credentials on multiple sites at the same time.

What is Credential Stuffing Attack?

300

This RAID level consists of an exact copy (or mirror) of a set of data on two or more disks with no parity, striping or spanning of disk space across multiple disks.

What is RAID 1?

300

This DDOS tool was used by Anonymous for several attacks, targetting a site and flooding the server with TCP, UDP or HTTP packets. Has capabilities of allowing your host machine to join a voluntary botnet.

What is the Low Orbit Ion Cannon (LOIC)?

300

This m word refers to someone or something that shows extreme or excessive care in the consideration or treatment of details.

What is meticulous?

300

*** DAILY DOUBLE ***

This RAID level combines the advantages (and disadvantages of RAID 0 and RAID 1 in one single system. This is a nested or hybrid RAID configuration, providing security by mirroring all data on secondary drives while using striping across each set of drives to speed up data transfers.

What is RAID 10?

400

This attack is a different mixture of password-cracking attacks. It's performed whenever the hacker knows a leaked password of yours and assumes you use a variation of it. The hacker uses a predefined list of phrases people often use to create passwords but extends them by adding variables - random symbols and numbers.

What is a Hybrid Attack?

400

This RAID level uses block-level striping with distributed parity to have redundancy while increasing write performance. Uses a minimum of three drives, and is still functional if only one drive fails.

What is RAID 5?

400

This Windows-only password recovery tool handles an enormous variety of tasks, including recovering passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

What is Cain and Abel?

400

This l word means to criticize someone or something very harshly. Is also sometimes used as a synonym of beat meaning "to assault".

What is lambaste?

400

*** DAILY DOUBLE ***

This is a http denial-of-service tool that has been around for several years. Written in Python, it generates unique HTTP requests that are designed to stress test web servers against resource exhaustion.

What is HULK? (HTTP-Unbearable-Load-King)

500

This type of attack uses password hashes that the bad actor has gathered. They can then see if it matches any of the precomputed hashes in their own database table.

What is a Rainbow Table Attack?

500

This RAID level uses block-level striping with double parity, allowing it to have redundancy, but has a performance penalty on write operations because of the associated parity calculations, doubling CPU overhead on write operations. Uses a minimum of 4 drives, and because of the double parity, can have two drives fail and still be functional.

What is RAID 6?

500

This DDOS tool specializes in shutting down hosts, network devices and servers by overwhelming them with different protocols such as UDP/TCP, ICMP, HTTP, L2CAP, ARP, and IEEE.

What is Raven-Storm?

500

This r word can refer specifically to a small building or area that provides soldiers with protection from attack, or more broadly to any safe or protected place, whether literal or figurative.

What is redoubt?

500

*** DAILY DOUBLE ***

This flag indicates that the connection is being torn down; both the sender and receiver send these segments to gracefully terminate the connection in TCP communications.

What is FIN?