What is the linux/unix command to use to list files and directories with in the current directory?
What is ls?
What was created to sabotage Iran’s nuclear program?
What is Stuxnet?
the enciphering and deciphering of messages in secret code or cipher
also : the computerized encoding and decoding of information
What is Cryptography?
____ is the psychological manipulation of people into performing actions or divulging confidential information.
What is Social Engineering?
This is a Debian derived Linux distribution managed and funded by the Offensive Security Ltd, designed for digital forensics and penetration testing. Which is this very famous OS majorly developed for Hackers and software testers?
What is Kali Linux?
~
What is the Home Directory?
____ is a combination of the words “robot” and “network”. It is a number of Internet-connected devices, each of which is running one or more bots. This can be used to perform DDoS attacks, steal data, send spam.
BotNet
It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.
What is Caesar Cipher?
_____ is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
What is Phishing?
_____ is a free and open source network protocol analyzer that enables users to interactively browse the data traffic on a computer network.
Used to configure the kernel-resident network interfaces, this used at boot time to set up interfaces as necessary.
What is ifconfig?
___ is an algorithm on a computer system that bypasses security controls. Generally, this is added by the original developer for some legitimate access, which may also be used by a hacker in a malicious way. What is this form of vulnerability called?
What is a Backdoor?
With this method of transposition, the plaintext message is encrypted into its scrambled format by being broken up into blocks and encrypted block-by-block.
What is a Block Cipher?
_____ is information collected from public sources such as those available on the Internet, although the term isn't strictly limited to the internet, but rather means all publicly available sources.
What is OSINT? or Open Source Intelligence?
______ is a open source penetration tool used for developing and executing exploit code against a remote target machine it. It also has the world’s largest database of public, tested exploits.
What is Metasploit?
What does Top do?
What is Displays the processes of CPU?
He has variously been called a hero, dissident, whistle blower, patriot, and a traitor. His disclosures have aggravated discussions about mass surveillance, government secrecy, and the delicate balance that must be maintained between national security and information privacy.
Who is Edward Snowden?
_____ is a symmetric-key algorithm for the encryption of electronic data. Although its short key length of 56 bits, criticized from the beginning, makes it too insecure for most current applications, it was highly influential in the advancement of modern cryptography.
Very fast, completely involuntary, and display the 7 basic universal emotions.
What are Micro-expressions?
____ is a computer file, typically called an image, that behaves like an actual computer.
What is a Virtual Machine?
for i in {1..12}; do for j in $(seq 1 $i); do echo -ne $i×$j=$((i*j))\t;done; echo;done
What is a Script?
_____ is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access.
What is Ransomware?
____ is the practice of concealing a file, message, image, or video within another file, message, image, or video
What is Steganography?
Interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet.
This is used for mapping networks and ports with a scanning tool and it features powerful NSE scripts which are perfect for detecting misconfigurations, and collecting information pertaining to network security.
What is NMAP?