Hello everyone! I'm Maseera Fatima, a final-year B.Tech CSE student passionate about blue teaming. In this blog, I'll be solving Search Skills. Let's get started!

Task 2: Evaluation of Search Results

Ques: What do you call a cryptographic method or product considered bogus or fraudulent?

Ans: Snake Oil

Ques: What is the name of the command replacing netstat in Linux systems?

Ans: ss

Task 3: Search Engines

Ques: How would you limit your Google search to PDF files containing the terms cyber warfare report?

Ans: filetype:pdf cyber warfare report

Ques: What phrase does the Linux command ss stand for?

Ans: Socket Statistics

Task 4: Specialized Search Engines

Ques: What is the top country with lighttpd servers?

Ans: United States

None

Ques: What does BitDefenderFalx detect the file with the hash 2de70ca737c1f4602517c555ddd54165432cf231ffc0e21fb2e23b9dd14e7fb4 as?

Ans: Android.Riskware.Agent.LHH

None

Task 5: Vulnerabilities and Exploits

Ques: What utility does CVE-2024–3094 refer to?

Ans: xz

None

Task 6: Technical Documentation

Ques: What does the Linux command cat stand for?

Ans: concatenate

Ques: What is the netstat parameter in MS Windows that displays the executable associated with each active connection and listening port?

Ans: -b

Task 7: Social Media

Ques: You are hired to evaluate the security of a particular company. What is a popular social media website you would use to learn about the technical background of one of their employees?

Ans: LinkedIn

Ques: Continuing with the previous scenario, you are trying to find the answer to the secret question, "Which school did you go to as a child?". What social media website would you consider checking to find the answer to such secret questions?

Ans: Facebook

Thank you for reading till the end! Stay tuned for the next blog — see you there!