Redalert CTF

1234567891011
Across
  1. 1. This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.
  2. 4. This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
  3. 7. This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
  4. 9. May sometime be known as Industroyer
  5. 11. The world’s most murderous malware
Down
  1. 1. Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
  2. 2. A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
  3. 3. This malware was reported to be involved with the 2015 cyber-attacks in Ukraine
  4. 5. This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
  5. 6. This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
  6. 8. A network security measure employed on one or more computers to physically isolated from another network.
  7. 10. A RAT targeting the ICS industry by the hacking group Dragonfly