| Malware | Exploits That Somehow Still Happen | Tools For Completely Legal Activites | Come On, Guys | Bad Encryption | 
|---|---|---|---|---|
| 
					  What is ransomware?					 
					 This kind of malware encrypts users' files and demands payment to unlock them | 
					  What is a macro virus?					 
					 This kind of virus can be baked directly into a Microsoft Office document and run automatically when opened | 
					  What is nmap?					 
					 This tool lets you check for open ports on a host | 
					  What is 123456?					 
					 The most common password among users of Adobe's website, according to a 2013 data breach | 
					  What is a substitution cipher?					 
					 A general type of cipher where one character is replaced with another | 
| 
					  What is a worm?					 
					 This kind of malware autonomously propagates, usually through e-mail | 
					  What is SQL injection?					 
					 Putting a semicolon after a query in a website's input form means you're probably trying to do this | 
					  What is John the Ripper?					 
					 This tool applies dictionary and brute-force attacks to crack password hashes extremely quickly | 
					  What is a password hint?					 
					 Something that most users had set to the exact same thing as their password, according to the 2013 Adobe data breach | 
					  What is ABC code / multi-tap code / phone keypad code?					 
					 1-800-222666333 | 
| 
					  What is the e-mail body sent by the ILOVEYOU / Loveletter worm?					 
					 "Kindly see the attached LOVELETTER coming from me." | 
					  What is a drive-by download?					 
					 When a file is downloaded and run on your computer without your knowledge after visiting a website | 
					  What is shred?					 
					 This UNIX utility lets you delete files without leaving any traces | 
					  What is a rogue antivirus?					 
					 Sometimes called a "rogue" for short, this is a particular kind of trojan horse that tries to scare users into buying it | 
					  What is MD5?					 
					 This cryptographic hash algorithm is infamous for failing at collision resistance | 
| 
					  What was the first virus ever written to target personal computers?					 
					 Brain.A | 
					  What is a buffer overflow/buffer overrun?					 
					 When you use "strcat" instead of "strncat" in a C program, you're potentially vulnerable to this | 
					  What is Aircrack-ng?					 
					 One of the things this suite of software can do is crack into insecure WEP/WPA2 wifi networks | 
					  What is Facebook?					 
					 In 2019, this social media platform leaked 267 million+ IDs, phone numbers, and names because a database was accidentally set to public | 
					  What is DES?					 
					 This symmetric encryption algorithm is a bit insecure, so just do it three times in a row | 
| 
					  What is Welchia?					 
					 This worm's payload actually helps the user by removing infections of the Blaster worm and installing security patches | 
					  What is (URL-encoded) shellcode?					 
					 An example of this, from the CodeRed worm, would be: %u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801 %u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3 %u0003%u8b00%u531b%u53ff%u0078%u0000%u00 | 
					  What is Powersploit?					 
					 This suite of powershell scripts is meant to be run on a victim's machine to perform keylogging, data exfiltration, etc. | 
					  What is Hashdump?					 
					 This student-run organization let a perfectly good domain name expire so it could be taken by a porn site | 
					  What is RC4?					 
					 The stream cipher that makes WEP insecure |