CTF_Practice
481 subscribers
35 photos
1 video
18 files
43 links
Download Telegram
Two-factor authentication (2FA) typically involves?


a) Using two different devices to access the internet
b) Answering two security questions
c) Providing two different passwords
d) Combining a password with another verification method
What is "pharming"?

a) A technique to harvest crops using computers
b) Redirecting users to a fake website to steal their information
c) A new type of social media platform
d) The act of releasing malware into the wild
πŸ‘1
What is a "firewall"?

a) A physical wall made of fire-resistant material
b) A security system that prevents unauthorized access to or from a private network
c) A tool used by firefighters to fight cyber threats
d) A type of antivirus software
What is the "principle of least privilege" in cybersecurity?

a) The idea that you should have as many privileges as possible
b) The concept that security is not necessary
c) Giving users the maximum privileges to avoid inconvenience
d) Providing users with only the minimum privileges necessary to perform their tasks securely
What is the primary goal of red teaming in cybersecurity?

a) Developing software applications
b) Identifying vulnerabilities and weaknesses
c) Deploying antivirus software
d) Creating strong passwords
Red teaming often involves simulating attacks similar to those conducted by?

a) Law enforcement agencies
b) Hacktivist groups
c) Competing businesses
d) Cybersecurity defenders
In red teaming, what is "exfiltration"?

a) The process of infiltrating an organization
b) The act of extracting sensitive information from a target
c) The initial reconnaissance phase
d) A social engineering technique
What is "open-source intelligence" (OSINT) in the context of red teaming?

a) Intelligence gathered from secret sources
b) Intelligence gathered from paid informants
c) Intelligence gathered from publicly available sources
d) Intelligence gathered from competitors
This time it will be based on your basic knowladge

ready guys ???
πŸ‘2
Which cipher rearranges the letters of a message to form a specific pattern, usually a zigzag?
Anonymous Quiz
26%
a) Morse code
17%
b) Playfair cipher
43%
c) Rail Fence cipher
13%
d) Baconian cipher
The Enigma machine used during World War 2 implemented a polyalphabetic substitution cipher. What feature allowed it to change the substitutions every letter?
Anonymous Quiz
10%
A) Plugboard wiring
48%
B) Rotating drums
38%
C) Encryption wheels
5%
D) Reflector
Which of these ciphers uses matrix transposition to encrypt a message?
Anonymous Quiz
19%
A) Playfair Cipher
23%
B) Hill Cipher
16%
C) Autokey Cipher
42%
D) XOR Cipher
HI everyone If you guys want to learn !
cracking & Ehical hacking

check this link below

πŸ‘‡πŸ‘‡πŸ‘‡

πŸ‘‰πŸ‘‰πŸ‘‰click_hereπŸ‘ˆπŸ‘ˆπŸ‘ˆ

πŸ‘†πŸ‘†πŸ‘†
πŸ‘2πŸ”₯1
CTF no - 29
Type - steg
level - Easy

Formate : gIven in the flag

cipher text : Click_here



Give Flag to - me @d4rkhax0r


1st solver - @ZishanAdThandar
2nd solver - @Bl4ckLynx007
πŸ‘1
From now everyweek 3 new ctf will be given and writeup also❣️
πŸ”₯3❀1
Ready for new ctf challenge or quiz!