In red teaming, what is "exfiltration"?
a) The process of infiltrating an organization
b) The act of extracting sensitive information from a target
c) The initial reconnaissance phase
d) A social engineering technique
a) The process of infiltrating an organization
b) The act of extracting sensitive information from a target
c) The initial reconnaissance phase
d) A social engineering technique
What is "open-source intelligence" (OSINT) in the context of red teaming?
a) Intelligence gathered from secret sources
b) Intelligence gathered from paid informants
c) Intelligence gathered from publicly available sources
d) Intelligence gathered from competitors
a) Intelligence gathered from secret sources
b) Intelligence gathered from paid informants
c) Intelligence gathered from publicly available sources
d) Intelligence gathered from competitors
Which of the following is NOT an OSINT source?
Anonymous Quiz
9%
a) Social media platforms
18%
b) Government databases
18%
c) Dark web forums
55%
d) Encrypted messaging apps
👍2
What is the primary goal of "social engineering" in OSINT?
Anonymous Quiz
12%
a) Extracting encrypted data
26%
b) Gathering information from the deep web
56%
c) Manipulating individuals to reveal confidential information
6%
d) Identifying vulnerabilities in software
Which of the following is NOT a common category of OSINT tools?
Anonymous Quiz
6%
a) Social Media Analysis Tools
6%
b) Web Scraping Tools
9%
c) GPS Tracking Tools
78%
d) Cryptocurrency Mining Tools
In a Vigenère cipher, what is a key used for?
Anonymous Quiz
18%
a) Decoding messages
21%
b) Increasing the length of the message
50%
c) Shifting letters in a message
11%
d) Encrypting messages
Which cipher rearranges the letters of a message to form a specific pattern, usually a zigzag?
Anonymous Quiz
26%
a) Morse code
17%
b) Playfair cipher
43%
c) Rail Fence cipher
13%
d) Baconian cipher
The Enigma machine used during World War 2 implemented a polyalphabetic substitution cipher. What feature allowed it to change the substitutions every letter?
Anonymous Quiz
10%
A) Plugboard wiring
48%
B) Rotating drums
38%
C) Encryption wheels
5%
D) Reflector
Which of these ciphers uses matrix transposition to encrypt a message?
Anonymous Quiz
19%
A) Playfair Cipher
23%
B) Hill Cipher
16%
C) Autokey Cipher
42%
D) XOR Cipher
HI everyone If you guys want to learn !
cracking & Ehical hacking
check this link below
👇👇👇
👉👉👉click_here👈👈👈
👆👆👆
cracking & Ehical hacking
check this link below
👇👇👇
👉👉👉click_here👈👈👈
👆👆👆
👍2🔥1
CTF no - 29
Type - steg
level - Easy
Formate : gIven in the flag
cipher text : Click_here
Give Flag to - me @d4rkhax0r
1st solver - @ZishanAdThandar
2nd solver - @Bl4ckLynx007
Type - steg
level - Easy
Formate : gIven in the flag
cipher text : Click_here
Give Flag to - me @d4rkhax0r
1st solver - @ZishanAdThandar
2nd solver - @Bl4ckLynx007
👍1
List of Cryptography Tools used in CTFs :
Decoder 1: www.dcode.fr/
symbols-ciphers
Decoder 2: cryptii.com
Dedcoder 3: gchq.github.io/CyberChef
Decoder 4: crackstation.net
Rot Decoder: theblob.org/rot.cgi
Twin Hex: www.calcresult.com/misc/cyphers/twin-hex.html
Decoder 1: www.dcode.fr/
symbols-ciphers
Decoder 2: cryptii.com
Dedcoder 3: gchq.github.io/CyberChef
Decoder 4: crackstation.net
Rot Decoder: theblob.org/rot.cgi
Twin Hex: www.calcresult.com/misc/cyphers/twin-hex.html
www.dcode.fr
dCode est le site universel pour déchiffrer des messages codés, tricher aux jeux de lettres, résoudre des énigmes, géocaches et chasses au trésor, etc.
👍5