Technology

Ugh, as if I know how to ‘exploit’ anyone or anything.

Questions

Which Reddit co-founder with the username ‘spez’ also founded the now disbanded travel search engine hipmunk?

STEVE HUFFMAN

Which Danish-Canadian invented PHP, the general-purpose scripting language geared towards web development in 1994?

RASMUS LERDORF

What does recursive acronym PHP stand for now, originally standing for ‘Personal home page’?

PHP: HYPERTEXT PREPROCESSOR

With the first names Paul and Joseph, which brothers founded Motorola in Chicago in 1928, with Paul’s son Bob succeeding him as CEO until 1986?

GALVIN

Apple’s M1 chip is an ARM system-on-a-chip, with ARM previously standing for what?

ADVANCED / ACORN RISC MACHINE

What is Tor short for in the name of the browser popular with those that surf the Darknet?

THE ONION ROUTER

Having variants from A to F, which 2003 worm is the second fastest to have gone nuts on the internet, only being surpassed by mydoom?

SOBIG

What term involving exploiting a bug or design flaw gives increased access to resources that should be blocked to an application or user?

ELEVATION OF PRIVILEGE / PRIVILEGE ESCALATION

A possible result of someone taking advantage of an exploit, in the extended acronym dDoS, what does the first d stand for, with DoS standing for ‘Denial of Service’?

DISTRIBUTED

What name is given to a hacker who violates laws or ethical standards, the term originating from 1950s westerns where they distinguished the bad guys from the good guys?

BLACK HAT

What term is used for an exploit found when a new piece of software is released but the developers are unaware of it, with patches usually being created to resolve it once it has been discovered?

ZERO DAY

Primarily known for its Pegasus spyware, which Israeli cyber-intelligence firm had a complaint filed against it by Apple in 2021 for allegedly developing the ‘zero-click’ exploit known as FORCEDENTRY?

NSO GROUP

What kind of test also known as ‘ethical hacking’ is an authorised simulated cyber attack on a computer system, performed to identify security weaknesses as well as strengths?

PENETRATION TEST / PENTEST

What does the TCP stand for in TCP/IP, with the IP standing for Internet Protocol?

TRANSMISSION CONTROL PROTOCOL

One of the core communication protocols of the Internet protocol suite, what does UDP stand for?

USER DATAGRAM PROTOCOL

A term borrowed from transportation, what is the part of transmitted data that is the actual message, with headers and metadata used to enable this to be sent? After using this in an exploit, this would enable pivoting to expand the attack surface of the target.

PAYLOAD