woody’s face 1: r1 r2 r3 c1 wonder cube c2 c3 – assembly

1
20 Woody’s Wonder Cube (You’ll wonder where your mind went!) 21 Imagine the cube as shown above, split out into faces. Use this to solve the puzzle with the clues below, where R = Row number, C = Column number. R1 – Function used to generate a number in a non-sequential order R2 – Technique used to execute something in a blind manner R3 – Ubuntu installation repository C1 – Technique used in advance stack smashing C2 – Assembly language instruction which does nothing C3 – Access level if the DB is running in god mode after successful SQL injection R1 – You will end up in front of this if you are caught by the police R2 – Tool used to assess hardware or software for weaknesses R3 – Library for building tools to analyse/modify an executable C1 – Given this when you register a vulnerability with a certain body C2 – Memory management feature for the x86 architecture C3 – Lord Scott Helmet is always banging on about this R1 – Disk with no moving parts R2 – The layer communication model within IT and Comms R3 – Abbreviation for an event with attendees C1 – IS team location responsible for monitoring/analysing C2 – Authentication service that permits a user to use 1 set of creds C3 – Name for an RS232 interface, after a German Industrial Standard R1 – Exploit used to attack XML endpoints R2 – University degree awarded for the eld of science R3 – Lowest bit in a series of numbers in binary C1 – Metalanguage to dene customised mark-up language C2 – Injection attack usually exploited in the browser UI C3 - Encrypts identical plaintext blocks into identical ciphertext blocks R1 – PGP creates this le to be easily useable by windows users R2 – One part of the path between source and destination of a packet R3 – Inferior competitor to the Amiga C1 – Common Bash script extension C2 – Attack used to prevent access to a service or device C3 – Buzzword bingo word for a stealthy computer network attack R1 – Radio communication system but components are implemented in software R2 – SNMP uses these to identify objects R3 – Used to map IP network addresses to the hardware addresses C1 – DNS record containing administrative information about the zone C2 – Abbreviated name for something that holds les/other stuff on a PC C3 – “BlueKeep” targets this protocol Face 1: Face 2: Face 3: Face 4: Face 5: Face 6: 1 3 2 4 5 6

Upload: others

Post on 12-Feb-2022

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Woody’s Face 1: R1 R2 R3 C1 Wonder Cube C2 C3 – Assembly

20

Woody’s Wonder Cube(You’ll wonder where your mind went!)

21

Imagine the cube as shown above, split out into faces.

Use this to solve the puzzle with the clues below, where R = Row number, C = Column number.

R1 – Function used to generate a number in a non-sequential orderR2 – Technique used to execute something in a blind mannerR3 – Ubuntu installation repository C1 – Technique used in advance stack smashingC2 – Assembly language instruction which does nothingC3 – Access level if the DB is running in god mode after successful SQL injection

R1 – You will end up in front of this if you are caught by the policeR2 – Tool used to assess hardware or software for weaknessesR3 – Library for building tools to analyse/modify an executable C1 – Given this when you register a vulnerability with a certain bodyC2 – Memory management feature for the x86 architectureC3 – Lord Scott Helmet is always banging on about this

R1 – Disk with no moving partsR2 – The layer communication model within IT and CommsR3 – Abbreviation for an event with attendeesC1 – IS team location responsible for monitoring/analysingC2 – Authentication service that permits a user to use 1 set of credsC3 – Name for an RS232 interface, after a German Industrial Standard

R1 – Exploit used to attack XML endpointsR2 – University degree awarded for the field of scienceR3 – Lowest bit in a series of numbers in binaryC1 – Metalanguage to define customised mark-up languageC2 – Injection attack usually exploited in the browser UIC3 - Encrypts identical plaintext blocks into identical ciphertext blocks

R1 – PGP creates this file to be easily useable by windows usersR2 – One part of the path between source and destination of a packetR3 – Inferior competitor to the AmigaC1 – Common Bash script extension C2 – Attack used to prevent access to a service or deviceC3 – Buzzword bingo word for a stealthy computer network attack

R1 – Radio communication system but components are implemented in softwareR2 – SNMP uses these to identify objectsR3 – Used to map IP network addresses to the hardware addressesC1 – DNS record containing administrative information about the zoneC2 – Abbreviated name for something that holds files/other stuff on a PCC3 – “BlueKeep” targets this protocol

Face 1:

Face 2:

Face 3:

Face 4:

Face 5:

Face 6:

1

32 4 5

6