Search Header Logo
Cyberstart Intern Base Level 1

Cyberstart Intern Base Level 1

Assessment

Presentation

Mathematics

12th Grade

Practice Problem

Easy

CCSS
RI.11-12.8, RF.3.3B, RI.9-10.7

+8

Standards-aligned

Created by

Maria Cruz Farooqi

Used 4+ times

FREE Resource

2 Slides • 16 Questions

1

Learning Target:​
I can get a feel for what it's like to work in cyber security.

I can experience challenges of various difficulties and disciplines as I visit multiple branches of the Cyber Protection Agency.

media

2

media

3

Dropdown

Question image
First and foremost, remember that with webpages there's information ​
what we see in the browser; code that we can ​
. In this instance, however, it may be something hidden amongst the ​
on the page that we're looking for - as the briefing notes, the information visible on the page is ​
to us.

4

Dropdown

Real-world Uses

It may seem a little silly to hide information by having the same color text as the background, but this is a ​
and heavily used technique even today. A good portion of ​
emails evade spam filters this way, and it's even been used to trick search engine bots into giving sites higher rankings in search results, in what's known as "Google bombing", which pushes spam and malicious sites to be more ​
than more legitimate sites.

5

Drag and Drop

The key point to note here is that what you ​
isn't all a computer will see - there's usually a lot of extra information for computers to work with, and it's that hidden ​
that can lead to all kinds of unseen ​
and trickery!
Drag these tiles and drop them in the correct blank above
see
data
bypasses

6

Multiple Choice

According to the speaker, a way to select all of the text on the page is by using...

1

Ctrl + Alt + Delete

2

Ctrl + A

3

Ctrl + T

4

Shift + T

7

Dropdown

Question image

Mixed Up Messages

We are told a group of ​
is communicating via a social media site, using ​
messages. One in particular, we believe, contains an ​
secret and we need to find out what it is.

8

Dropdown

Interestingly, this is actually a tactic that cyber ​
use in real life! They'll use real ​
and hide information in ​
form in plain site.

9

Dropdown

Real-world Uses

Until recently when machine learning and artificial intelligence got a whole lot smarter, computers have generally found understanding our natural language hard. Think about it - swap a few letters around, especially near the start of a word and a ​
just doesn't understand what the word could be. Over the decades, programmers have written ever more sophisticated techniques to help software to "unjumble" letters, but it still can be hard for computers to ​
.

10

Multiple Choice

The Agent in the video went to Google to help break the code. What did he type in Google?

1

Help me break a code.

2

Encryption Breaker

3

Code Decipher

4

Reverse Text

11

Dropdown

Question image

Social Engineering

Permission has been granted to try and log into the Chirp social media account of a ​
who goes by the name of D4YDR3AM. Luckily for us, they've been ​
with their personal information. We know their dog's name is ​
and they were born in ​
. Can you use what we know about them to guess their password and get us into their account?

12

Dropdown

We know their dog's name, ​
, and that the hacker was born in ​
. We need to use these pieces of personal information to try and guess the user's ​
. This challenge is based on something that unfortunately happens a lot in real life: using ​
information to craft a password.

13

Drag and Drop

Real-world Uses

People generally pick bad ​
. They're often too short and based on readable ​
. So an attacker could use programs to try brute forcing a huge variations of login ​
, perhaps be lucky enough to guess the right credentials and so gain access.
Drag these tiles and drop them in the correct blank above
passwords
words
attempts
security questions

14

Dropdown

Users also share too much about ​
online - family name, age, location, favourite sports team, pet names and more. ​
can use this to tailor and so filter down the list of words their brute forcing software will try. There's even software out there for hackers that will "profile" users to ​
a list of words, so hackers can automate the initial process of targeted password attempt lists and so have a list of smarter login attempts produced more efficiently! ​
continue to be one of the greatest entry points for malicious actors.

15

Multiple Choice

What was the first password guessed by the Agent in the video?

1

Barkley93

2

93Barkley

3

1993Barkley

4

Barkley1993

16

Drag and Drop

Question image
Lazy Locked In

Briefing: The agency recently purchased a home hub for the office to automate appliances like lights and thermostats. But recently, we've been receiving complaints about irregular temperature
and lights unpredictably turning on and off.

We've found where you can access the home hub settings along with the sign in details, but it turns out you can only submit the form and sign in from a
laptop. We need you to figure out how we can
this restriction so we can adjust the settings and restore normality in the office!


Drag these tiles and drop them in the correct blank above
changes
technician's
bypass
ignore
enhance
install

17

Dropdown

As the briefing also notes, the username and password are already provided for this challenge. The problem is, we can't click the "​
" button to complete the login. We can click the Open Devtools button in the top-right of the ​
. This will open the inspector to the right side of the window. We can see an ​
comment - content that is visible amongst the code itself, but hidden from display on the webpage: "Developer notes: This will be disabled if page not accessed from technician's laptop". Underneath this we can see another element, and notably, a disabled attribute on it: <input ... value="Enter" disabled="">.

If we click the disabled attribute and hit the Delete key on your keyboard, we can ​
it from the element entirely. When removed, hit the "Enter" key on your keyboard to save the changes to the element. Now, we're able to click the "Enter" button on the Homehub login, and receive the flag for the challenge.

18

Match

Match the following

time4hackattack

Barkley1993

value="Enter" disabled>

Learning Target:​
I can get a feel for what it's like to work in cyber security.

I can experience challenges of various difficulties and disciplines as I visit multiple branches of the Cyber Protection Agency.

media

Show answer

Auto Play

Slide 1 / 18

SLIDE