Redalert CTF
Across
- 1. This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.
- 4. This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
- 7. This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
- 9. May sometime be known as Industroyer
- 11. The world’s most murderous malware
Down
- 1. Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
- 2. A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
- 3. This malware was reported to be involved with the 2015 cyber-attacks in Ukraine
- 5. This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
- 6. This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
- 8. A network security measure employed on one or more computers to physically isolated from another network.
- 10. A RAT targeting the ICS industry by the hacking group Dragonfly