Across
- 2. The M in HTML
- 3. an enterprise-class open source distributed monitoring solution, created by Alexei Vladishev
- 5. IEE 802.11 describes which type of network?
- 8. Network authentication protocol
- 9. A cat tries to catch it but you can use it with your computer
- 11. The Ripper Cracking tool
- 13. Famous packet analyzer
- 17. Protocol that gives access to a user on a remote system
- 18. Malware that encrypts data for money
- 19. init 6
- 20. Famous proxy tool for web penetration testing
- 23. Goddess of Cyprus,Venus...
- 24. which is the first layer in OSI
- 26. Database attack, ____ Injection
Down
- 1. You can use it for anonymity
- 2. Spyware, Trojan, worm, virus
- 4. name of first virus
- 6. 127.0.0.1 IP address
- 7. decode this hex -> 7365637572697479
- 10. Cross Site _____ Attack
- 12. Swiss army knife of hacking tool/frequently used as backdoor
- 14. Mac address is a 12 byte. What type of numbers?
- 15. Famous Debian Distribution for Penetration Testing
- 16. TCP & UDP runs in that OSI Layer
- 19. Not bind shell
- 21. Not TCP
- 22. control and store your repo
- 25. Which protocol is used by ping command
