Two-factor authentication (2FA) typically involves?
a) Using two different devices to access the internet
b) Answering two security questions
c) Providing two different passwords
d) Combining a password with another verification method
a) Using two different devices to access the internet
b) Answering two security questions
c) Providing two different passwords
d) Combining a password with another verification method
What is "pharming"?
a) A technique to harvest crops using computers
b) Redirecting users to a fake website to steal their information
c) A new type of social media platform
d) The act of releasing malware into the wild
a) A technique to harvest crops using computers
b) Redirecting users to a fake website to steal their information
c) A new type of social media platform
d) The act of releasing malware into the wild
π1
What is a "firewall"?
a) A physical wall made of fire-resistant material
b) A security system that prevents unauthorized access to or from a private network
c) A tool used by firefighters to fight cyber threats
d) A type of antivirus software
a) A physical wall made of fire-resistant material
b) A security system that prevents unauthorized access to or from a private network
c) A tool used by firefighters to fight cyber threats
d) A type of antivirus software
What is the "principle of least privilege" in cybersecurity?
a) The idea that you should have as many privileges as possible
b) The concept that security is not necessary
c) Giving users the maximum privileges to avoid inconvenience
d) Providing users with only the minimum privileges necessary to perform their tasks securely
a) The idea that you should have as many privileges as possible
b) The concept that security is not necessary
c) Giving users the maximum privileges to avoid inconvenience
d) Providing users with only the minimum privileges necessary to perform their tasks securely
What is the primary goal of red teaming in cybersecurity?
a) Developing software applications
b) Identifying vulnerabilities and weaknesses
c) Deploying antivirus software
d) Creating strong passwords
a) Developing software applications
b) Identifying vulnerabilities and weaknesses
c) Deploying antivirus software
d) Creating strong passwords
Red teaming often involves simulating attacks similar to those conducted by?
a) Law enforcement agencies
b) Hacktivist groups
c) Competing businesses
d) Cybersecurity defenders
a) Law enforcement agencies
b) Hacktivist groups
c) Competing businesses
d) Cybersecurity defenders
In red teaming, what is "exfiltration"?
a) The process of infiltrating an organization
b) The act of extracting sensitive information from a target
c) The initial reconnaissance phase
d) A social engineering technique
a) The process of infiltrating an organization
b) The act of extracting sensitive information from a target
c) The initial reconnaissance phase
d) A social engineering technique
What is "open-source intelligence" (OSINT) in the context of red teaming?
a) Intelligence gathered from secret sources
b) Intelligence gathered from paid informants
c) Intelligence gathered from publicly available sources
d) Intelligence gathered from competitors
a) Intelligence gathered from secret sources
b) Intelligence gathered from paid informants
c) Intelligence gathered from publicly available sources
d) Intelligence gathered from competitors
Which of the following is NOT an OSINT source?
Anonymous Quiz
9%
a) Social media platforms
18%
b) Government databases
18%
c) Dark web forums
55%
d) Encrypted messaging apps
π2
What is the primary goal of "social engineering" in OSINT?
Anonymous Quiz
12%
a) Extracting encrypted data
26%
b) Gathering information from the deep web
56%
c) Manipulating individuals to reveal confidential information
6%
d) Identifying vulnerabilities in software
Which of the following is NOT a common category of OSINT tools?
Anonymous Quiz
6%
a) Social Media Analysis Tools
6%
b) Web Scraping Tools
9%
c) GPS Tracking Tools
78%
d) Cryptocurrency Mining Tools
In a Vigenère cipher, what is a key used for?
Anonymous Quiz
18%
a) Decoding messages
21%
b) Increasing the length of the message
50%
c) Shifting letters in a message
11%
d) Encrypting messages
Which cipher rearranges the letters of a message to form a specific pattern, usually a zigzag?
Anonymous Quiz
26%
a) Morse code
17%
b) Playfair cipher
43%
c) Rail Fence cipher
13%
d) Baconian cipher
The Enigma machine used during World War 2 implemented a polyalphabetic substitution cipher. What feature allowed it to change the substitutions every letter?
Anonymous Quiz
10%
A) Plugboard wiring
48%
B) Rotating drums
38%
C) Encryption wheels
5%
D) Reflector
Which of these ciphers uses matrix transposition to encrypt a message?
Anonymous Quiz
19%
A) Playfair Cipher
23%
B) Hill Cipher
16%
C) Autokey Cipher
42%
D) XOR Cipher
HI everyone If you guys want to learn !
cracking & Ehical hacking
check this link below
πππ
πππclick_hereπππ
πππ
cracking & Ehical hacking
check this link below
πππ
πππclick_hereπππ
πππ
π2π₯1
CTF no - 29
Type - steg
level - Easy
Formate : gIven in the flag
cipher text : Click_here
Give Flag to - me @d4rkhax0r
1st solver - @ZishanAdThandar
2nd solver - @Bl4ckLynx007
Type - steg
level - Easy
Formate : gIven in the flag
cipher text : Click_here
Give Flag to - me @d4rkhax0r
1st solver - @ZishanAdThandar
2nd solver - @Bl4ckLynx007
π1
From now everyweek 3 new ctf will be given and writeup alsoβ£οΈ
π₯3β€1