Types of browsers

1. Internet Explorer does not work on your computer anymore and every time you try to run it the computer shuts down. You are unable to access the Internet to download a new version or another browser or upgrade your operating system. Why does the computer shutdown when Internet Explorer is clicked on? Hint: what is a shortcut?

2. In your network set up you realize the presence of another access point (AP) with a more or less similar behavior as the legitimate access point and capable of enticing the users to connect to the authorized access point (Coleman & Westcott, 2009). Use of aircrack-ng suite’s airbase-ng tool can change the wireless adapter to an access point. The tool is a superb client-side hack providing the end users with an ability to see traffic from the client then carry out a man-in-the middle attack. The procedure for establishing an evil twin access point will be as follows:
1. Start airmon-ng
2. Start airdump-ng
3. Wait till the suspect connects
4. Create a new AP with a similar MAC address and SSID
5. De authenticate
6. Try turning up the power
Instructions to Students
Type the commands that will be appropriate for each of the above mentioned procedures alongside the reason behind the execution of the same. For instance, step 1 is aimed at determining whether the wireless card under use is operational can be accomplished by the command bt>iwconfig

3. I am a quick an easy tool that can be executed from the command line for finding and testing wireless networks? I can also attack and crack!
Hint: Automated Wireless Auditor – kali linux

READ ALSO :   Biodiversity in Afghanistan

4. Signing an email message = 30 points
No security method is perfect, if the digital signature cannot be verified, the certificate is known to be untrustworthy. Arrange the sentence line’s letters in the boxes on the left to the number matching the order in which they occur illustrate the process of sending a digitally signed message by. (i.e. first action to occur would be 1)
(Points : 30)
Potential Matches:
1 : 5
2 : 2
3 : 6
4 : 3
5 : 1
6 : 4
Answer
: A. Hash value is encrypted with the sender’s private key.

: B. Message is sent.

: C. Message is captured.

: D. Hash value of the message is calculated.

: E. Encrypted hash value is appended to the message as a digital signature.

: F. Sender’s private key is retrieved from the sender’s digital certificate.
5. You are a US Marshal in search of an escaped convict. When attempting to apprehend the convict your team has been one step behind them at every attempt. However, this time is seems the convict has made a mistake and used a computer that was being monitored. There is a PCAP File that may have some information where the convict is meeting their accomplice to try and escape the country. See if you can help aid in the capture of the escape prisoner.
-hint- This is a job for forensics.

6. A malicious saboteur has penetrated a peaceful news website (http://dgreenan.mydevryportfolio.com/humans_Being/index.html) with the intent of spreading slanderous statements about Walt Disney, David Hasselhoff, and the old lady from “Murder She Wrote.” In a brazen move the saboteur has uploaded his picture; your goal is to find the image for police evidence.
Hints:
1) Some websites limit what search engines are allowed to index. What is this file called?
7. Encrypted: JXYI YI Q JUIJ EV JXU SUQIQH SYFXUH QBWEHYJXC
Shift: – 10
Hit: Check out substitution cipher
8. You intercepted the following messages sent by an adversary:

READ ALSO :   Population Management Power Point

Yjcvkuaqwtpgzveadgtugewtkvaegtvkhkecvkqp? Yjcvkuaqwtvqr 3 egtvkhkecvkqp?

Based on your analysis, this messages appears to be encrypted via a Caesar cipher. Your objective is to decode this message in 10 minutes and share its content during the next brief.
9. An USB drive labeled Space Craft Codes was found in an unlocked safe. The files inside seem to be encrypted. Run a brute force the password to gain access to the encrypted files.

Filename: SpaceCraftCodes in docsharing
10. You noticed that the robot is trying to communicate with a server other than the mother ship, the server it is trying to communicate with is mrhoste.com. What region is the server located at.
11. This type of CTF problem I have in mind involves using a randomly generated set of words and numbers that adds up to solution at the end of the problem. Participants will be given a short phrase encrypted in the “Caesar Cipher”, the participant must then translated the phase into “clear text” and then convert the clear text phrase into a binary value.
Phrase: NYY LBHE ONFRF NER ORYBAT GB HF.
12 Alex turns on his brother’s computer and realizes he does not know the password. He starts looking around and finds the following code: tae mfsswkqrnkqfhexslqktaeqsokimuteqbsrfvbr
That code contains the password to log in the computer. Find what cipher was used, and decipher the code. Within the code find the password to get into Alex’s computer.
1. Hint 1: Use a keyword
2. Hint 2: The keyword is a city in Italy
3. Hint 3: Keyword hint – Marble Statue found in Galleria dell’’ Academia in the city of…
13. Can you function?
Your robot is almost ready to help you navigate the stars. However, when you speak to the robot to arrange for fueling it can’t figure out how much gas is needed to travel. The ship can only be fueled by a robot because the fuel is deadly to humans. You display the diagnostic programming interface (below). Figure out what is needed and you’ll be in interstellar mode in no time.
#include<stdio.h>
int main()
{
printf(“%f\n”, log(36.0));
return 0;
}
• Hint: The C language has many functions which perform basic and advanced functions:

READ ALSO :   Refugees rights in the international law

http://en.wikibooks.org/wiki/C_Programming/Procedures_and_functions
14. Two spies are meeting somewhere to exchange secret information. Figure out exactly where they are meeting and when from the attached file.
File in docsharing: decryptme.zip
15. The FBI knows about the robot and has been in communication of its whereabouts. We need to locate the email address and the user names of the FBI in order to counter their intelligence. Luckily you have intercepted a PCAP file. In order to counter the intelligence we need the passwords to the email. PCAP file is in docsharing question15pcap.zip