You are on page 1of 2

cybersecurity terms

-------------------

Skyfall (2012)
--------------
(there is no level in encryption.. there is file or segment of hard drive)

- malware
- polymorphism code
- code obfuscation

Mr. Roboto S3 E1 2017


---------------------
CTF - Capture the Flag
DEF CON -- biggest CTF in the world
C2 Domain - Command and Control
shred - it is a unix command to not only delete but also rewire them so that the
files would be much more difficult to recover even with specialized forensic
software.

Ocean's 8 2018
------------
open-source intelligence -- fancy term for the internet
spear-phishing attack

The Matrix Reloaded 2003 scene 4=3 trinity


------------------------
nmap - networking mapping tools
sshnuke

The Girl with the dragon tattoo 2011 scene analysis


------------------------------------
the scene is realitic because she do exactly what hacker need to do. Trained her
ear to listen to the sound of keypad and then unlock the door.. and then go inside,
get all the necessary setup photos and what setup it is, plug in the cellulor
device with uplinking with sim and the device connected through ethernet cable, and
because of cellulor network we can take remote access. So that scene is realistic.
A lesson to remember.

The Social Network 2010 hacking


-----------------------
Zero-Day Exploits --> attacks that target unknown vulnerabilities

The Fate of the Furious 2017 hack em all


----------------------------
hacking a car --> but the scene is unrealistic for now but no one knows about the
future.

Wargames 1983
-------------
written password on paper
people recycle the password
password recylce create vulnerabiltiy to you.
don't use same or close to that password on 2 different website
credntial studffing
2FA or Multi Factor Authentication

Star Trek Discovvert s2 e8 2019


-------------------------------
SQL Injections

Silicon Valley s4 e9 2017


-------------------------
"So, they log on to our boxes, and our boxes log on to the real WiFi?"
- Real life device ==> WiFi Pineapple made by Hak5
"So we show them a fake landing page and force everyone to download a doctored
version of the Hooli-Con app."

Jason Bourne 2016


-----------------
- Vault 7 --> featured by WikiLeaks ---> actual leak from the CIA.
-Port Knocking

Hackers 1995
------------
- The Da Vinci Virus --> very distruptive virus
- Ransomware --> encrypt system and then ask ransom to decrypt it.

HACKERS DON'T BREAK IN. WE LOG IN.

You might also like