Famous Breaches & Hackers
Cybersecurity Basics
Tools & Solutions
100

In 2011, this gaming company faced a massive breach, compromising the personal details of millions of its online gaming service users.

What is Sony PlayStation Network?

100

This type of attack involves flooding a target with superfluous requests to overload systems and prevent legitimate requests.

What is a Denial of Service (DoS) attack?

100

A popular Linux distribution that comes preloaded with a variety of security testing tools.

What is Kali Linux (or Parrot)?

200

This notorious hacker, known for his exploits in the 1990s, was eventually caught and turned into a cybersecurity consultant, authoring books such as "The Art of Deception".

Who is Kevin Mitnick?

200

This security measure involves verifying the identity of a user or system by pairing something they know with something they have.

What is Two-Factor Authentication?

200

This company purchased Splunk in 2023.

Who is Cisco?

300

This hacker group, known for its politically charged actions and use of a Guy Fawkes mask, has targeted governments, corporations, and the Church of Scientology.

Who is Anonymous?

300

This attack intercepts and relays messages between two parties without them knowing.

What is a Man-in-the-Middle attack?

300

This tool, often associated with a snake, is a widely-used programming language that also finds applications in cybersecurity for writing scripts and analyzing data.

What is Python?

400

This network management company faced a breach in 2020, affecting several U.S. government agencies and major corporations.

What is SolarWinds?

400

A network protocol that provides an encrypted tunnel for transporting IP traffic through an untrusted network.

What is IPsec?

400

This term refers to a strategy that involves hiding a message, image, or file within another message, image, or file, primarily used to maintain the secrecy of the information.

What is Steganography?

500

This individual, known as "The Homeless Hacker," broke into several high-profile networks, including Microsoft and The New York Times, before his arrest in 2003.

Who is Adrian Lamo?

500

This protocol, developed by Netscape, is used for securing communications between web browsers and web servers.

What is SSL?

500

This tool is a command-line interface (CLI) web crawling tool written in Golang. It is designed to crawl websites to gather information and endpoints.

What is Katana?