Linux/Unix Commands
Attacks/Vulnerabilities
Cryptography
Social Engineering
Tools
100

What is the linux/unix command to use to list files and directories with in the current directory?

What is ls?

100

What was created to sabotage Iran’s nuclear program?

What is Stuxnet?

100

the enciphering and deciphering of messages in secret code or cipher

also : the computerized encoding and decoding of information

What is Cryptography?

100

____ is the psychological manipulation of people into performing actions or divulging confidential information.

What is Social Engineering?

100

This is a Debian derived Linux distribution managed and funded by the Offensive Security Ltd, designed for digital forensics and penetration testing. Which is this very famous OS majorly developed for Hackers and software testers?

What is Kali Linux?

200

What is the Home Directory?

200

____ is a combination of the words “robot” and “network”. It is a number of Internet-connected devices, each of which is running one or more bots. This can be used to perform DDoS attacks, steal data, send spam.

BotNet

200

It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

What is Caesar Cipher?

200

_____ is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

What is Phishing?

200

_____ is a free and open source network protocol analyzer that enables users to interactively browse the data traffic on a computer network. 

What is Wireshark?
300

Used to configure the kernel-resident network interfaces, this used at boot time to set up interfaces as necessary.

What is ifconfig?

300

___ is an algorithm on a computer system that bypasses security controls. Generally, this is added by the original developer for some legitimate access, which may also be used by a hacker in a malicious way. What is this form of vulnerability called?

What is a Backdoor?

300

With this method of transposition, the plaintext message is encrypted into its scrambled format by being broken up into blocks and encrypted block-by-block.

What is a Block Cipher?

300

_____ is information collected from public sources such as those available on the Internet, although the term isn't strictly limited to the internet, but rather means all publicly available sources.

What is OSINT? or Open Source Intelligence?

300

______ is a open source penetration tool used for developing and executing exploit code against a remote target machine it. It also has the world’s largest database of public, tested exploits.


What is Metasploit?

400

What does Top do?

What is Displays the processes of CPU?

400

He has variously been called a hero, dissident, whistle blower, patriot, and a traitor. His disclosures have aggravated discussions about mass surveillance, government secrecy, and the delicate balance that must be maintained between national security and information privacy.

Who is Edward Snowden?

400

_____ is a symmetric-key algorithm for the encryption of electronic data. Although its short key length of 56 bits, criticized from the beginning, makes it too insecure for most current applications, it was highly influential in the advancement of modern cryptography.

What is DES? (Data Encryption Standard)
400

Very fast, completely involuntary, and display the 7 basic universal emotions.

What are Micro-expressions?

400

____ is a computer file, typically called an image, that behaves like an actual computer.

What is a Virtual Machine?

500

for i in {1..12}; do for j in $(seq 1 $i); do echo -ne $i×$j=$((i*j))\t;done; echo;done

What is a Script?

500

_____ is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access.

What is Ransomware?

500

____ is the practice of concealing a file, message, image, or video within another file, message, image, or video

What is Steganography?

500

Interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet.

What is Maltego?
500

This is used for mapping networks and ports with a scanning tool and it features powerful NSE scripts which are perfect for detecting misconfigurations, and collecting information pertaining to network security.

What is NMAP?