Quelques pistes de solution pour la catégorie “General Information” de Cyber Talents. Il s’agit de questions de culture gé’. Si vous ne connaissez pas la réponse, le but de cette catégorie est plutôt simple: Just Google it :)

Au besoin, visitez ce lien: https://lmgtfy.com/?iie=1&q=how+do+I+use+google+to+search+things?

Business Gathering

I am a huge cyber security conference that run every year in three places : San Francisco, Singapore and Lately AbuDhabi. Who am I ? No spaces in answering

Ref: https://securityintelligence.com/the-pick-of-2017-cybersecurity-conferences/

Founder

I have founded two of the most famous Cyber Security conferences across the globe in Las Vegas, USA. I am not The Dark Knight. I am The DarK——–?

Ref:

Back to History

I am the First Computer Virus ever known . You will find me in your head . My name is ……..?

Ref: https://www.thevintagenews.com/2016/09/08/priority-brain-first-computer-virus-created-two-brothers-pakistan-just-wanted-prevent-customers-making-illegal-software-copies/

Contribute

I am an Organization that releases the Top 10 Vulnerabilities in Application Security . I am ……?

Ref: https://www.veracode.com/directory/owasp-top-10

Pay Me

I will lock your machine screen or files till you pay me. Who am i ?

Ref: https://www.malwarebytes.com/ransomware/

TrendMicro Conference

Periodic Conference in many cities hosted by Trend Micro

Ref: https://www.cloudsec.com/sg/

Intercept

the attacker intercept information between receiver and sender. what is the attack name ?

Ref: https://www.veracode.com/security/man-middle-attack

My box

I am a professional pen tester. I do not need to know any information from the customer, I do ….box pen test

Ref: https://resources.infosecinstitute.com/what-are-black-box-grey-box-and-white-box-penetration-testing/

Hackers Gathering

I am a cyber security conference that run in August every year in Las Vegas. I am the largest gathering for Hackers in the whole world. No Credit cards, no online booking , Only Cash allowed . Who am I ?

Ref: https://defcon.org/

Greeks

The art of hiding messages or information inside other image / text or data

Ref: https://en.m.wikipedia.org/wiki/Steganography

Robot

A group or network of machines that are controlled by an attacker to do a certain task

Ref: https://en.m.wikipedia.org/wiki/Internet_bot

Japanese Warrior

I am a linux distrubition with two versions one for Web Penetration Testing and the other for attacking smart grids. What is my smart grid distribution name ?

Ref: https://nullcon.net/website/nullcon-2016/training/penetration-testing-smartgrid-and-scada.php

SCADA

A worm that targeted SCADA Systems

Ref: https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet

Capture

Network analysis tool used to captured packets and present it in readable format

Ref: https://en.wikipedia.org/wiki/Wireshark

Scan

One of the famous, free port scanner. Who am i ?

Ref: https://en.wikipedia.org/wiki/Nmap

Crash

enter a lot of random trash till the application crash

Ref: https://en.wikipedia.org/wiki/Fuzzing

Modify Code

Change code from one form to another to prevent attacker from understanding it

Ref: https://en.wikipedia.org/wiki/Obfuscation

CC-BY

This work is licensed under a Creative Commons Attribution 4.0 International License.