Quelques pistes de solution pour la catégorie “General Information” de Cyber Talents. Il s’agit de questions de culture gé’. Si vous ne connaissez pas la réponse, le but de cette catégorie est plutôt simple: Just Google it :)
Au besoin, visitez ce lien: https://lmgtfy.com/?iie=1&q=how+do+I+use+google+to+search+things?
Business Gathering
I am a huge cyber security conference that run every year in three places : San Francisco, Singapore and Lately AbuDhabi. Who am I ? No spaces in answering
Ref: https://securityintelligence.com/the-pick-of-2017-cybersecurity-conferences/
Founder
I have founded two of the most famous Cyber Security conferences across the globe in Las Vegas, USA. I am not The Dark Knight. I am The DarK——–?
Ref:
Back to History
I am the First Computer Virus ever known . You will find me in your head . My name is ……..?
Contribute
I am an Organization that releases the Top 10 Vulnerabilities in Application Security . I am ……?
Ref: https://www.veracode.com/directory/owasp-top-10
Pay Me
I will lock your machine screen or files till you pay me. Who am i ?
Ref: https://www.malwarebytes.com/ransomware/
TrendMicro Conference
Periodic Conference in many cities hosted by Trend Micro
Ref: https://www.cloudsec.com/sg/
Intercept
the attacker intercept information between receiver and sender. what is the attack name ?
Ref: https://www.veracode.com/security/man-middle-attack
My box
I am a professional pen tester. I do not need to know any information from the customer, I do ….box pen test
Hackers Gathering
I am a cyber security conference that run in August every year in Las Vegas. I am the largest gathering for Hackers in the whole world. No Credit cards, no online booking , Only Cash allowed . Who am I ?
Ref: https://defcon.org/
Greeks
The art of hiding messages or information inside other image / text or data
Ref: https://en.m.wikipedia.org/wiki/Steganography
Robot
A group or network of machines that are controlled by an attacker to do a certain task
Ref: https://en.m.wikipedia.org/wiki/Internet_bot
Japanese Warrior
I am a linux distrubition with two versions one for Web Penetration Testing and the other for attacking smart grids. What is my smart grid distribution name ?
Ref: https://nullcon.net/website/nullcon-2016/training/penetration-testing-smartgrid-and-scada.php
SCADA
A worm that targeted SCADA Systems
Ref: https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet
Capture
Network analysis tool used to captured packets and present it in readable format
Ref: https://en.wikipedia.org/wiki/Wireshark
Scan
One of the famous, free port scanner. Who am i ?
Ref: https://en.wikipedia.org/wiki/Nmap
Crash
enter a lot of random trash till the application crash
Ref: https://en.wikipedia.org/wiki/Fuzzing
Modify Code
Change code from one form to another to prevent attacker from understanding it
Ref: https://en.wikipedia.org/wiki/Obfuscation
This work is licensed under a Creative Commons Attribution 4.0 International License.