0% found this document useful (0 votes)
90 views5 pages

Cybertalent

The document discusses various cybersecurity terms and concepts. It provides clues in the form of questions to guess cybersecurity related terms, people, conferences, attacks, and tools. Some of the terms identified include Packetrix linux distribution, Brain computer virus, Defcon hacking conference, Tangent cybersecurity conference founder, OWASP application security vulnerabilities, Steganography information hiding technique, Bot network of attacker controlled machines, SamuraiSTFU smart grid penetration testing linux distribution, Ransomware encryption malware, MITM man-in-the-middle attack, Obfuscation code modification, Black box penetration testing, Fuzzing application crashing, Nmap port scanner, Wireshark network packet analyzer, Zeroday unknown

Uploaded by

simon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views5 pages

Cybertalent

The document discusses various cybersecurity terms and concepts. It provides clues in the form of questions to guess cybersecurity related terms, people, conferences, attacks, and tools. Some of the terms identified include Packetrix linux distribution, Brain computer virus, Defcon hacking conference, Tangent cybersecurity conference founder, OWASP application security vulnerabilities, Steganography information hiding technique, Bot network of attacker controlled machines, SamuraiSTFU smart grid penetration testing linux distribution, Ransomware encryption malware, MITM man-in-the-middle attack, Obfuscation code modification, Black box penetration testing, Fuzzing application crashing, Nmap port scanner, Wireshark network packet analyzer, Zeroday unknown

Uploaded by

simon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

I am a linux distribution that has many tricks to do packet and traffic analysis. Who am I ?

packetrix

am the First Computer Virus ever known . You will find me in your head . My name is ……..?brain

I have founded two of the most famous Cyber Security conferences across the globe in Las Vegas,

USA. I am not The Dark Knight. I am The DarK--------?Tangent ,

I am a huge cyber security conference that run every year in three


places : San Francisco, Singapore and Lately Abu Dhabi. Who am I?
RSA Conference

I am a cyber security conference that run in August every year in Las


Vegas. I am the largest gathering for Hackers in the whole world. No
Credit cards, no online booking , Only Cash allowed . Who am I?
Defcon

I have founded two of the most famous Cyber Security conferences


across the globe in Las Vegas, USA. I am not The Dark Knight. I am
The DarK — — — — ?Tangent

Back to History

am the First Computer Virus ever known . You will find me in your
head . My name is ……..?

Brain

Contribute

I am an Organization that releases the Top 10 Vulnerabilities in


Application Security . I am ……?
OWASP

Greeks

The art of hiding messages or information inside other image / text or


data

Steganography

Robot

A group or network of machines that are controlled by an attacker to


do a certain task

Bot

Japanese Warrior

I am a linux distrubition with two versions one for Web Penetration


Testing and the other for attacking smart grids. What is my smart grid
distribution name ?

SamuraiSTFU

Close Look

I am a linux distribution that has many tricks to do packet and traffic


analysis. Who am I?

Packetrix
Pay Me

I will lock your machine screen or files till you pay me. Who am i?

Ransomware

TrendMicro Conference

Periodic Conference in many cities hosted by Trend Micro

CloudSec

Intercept

the attacker intercept information between receiver and sender. what


is the attack name?

MITM

Modify Code

Change code from one form to another to prevent attacker from


understanding it

Obfuscation

My box

I am a professional pen tester. I do not need to know any information


from the customer, I do ….box pen test
Black

Crash

Enter a lot of random trash till the application crash

Fuzzing

Scan

One of the famous, free port scanner. Who am i ?

Nmap

Capture

Network analysis tool used to captured packets and present it in


readable formatWireshark

Precious Vulnerability

a security flaw that is not yet knownZeroday

SCADA

A worm that targeted SCADA SystemsStuxnet

Cash

I am a type of attacks that used to spread malware. I push data in the


cache records of your DNS. I am cache ……..?
Poisoning

User Name

He is a user name or account that by default has access to all


commands and files on a Linux or other Unix-like operating system.

Root

Thanks for staying till here.

If you like this article, please support on Patreon.

You might also like