Hidden Tear Ransomware Setup

Hidden Tear Ransomware Setup

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial explains how to set up and execute the Hidden Tier ransomware, an open-source project on GitHub. It covers the history of the ransomware, the tools needed, and the steps to modify and execute it. The tutorial also details setting up a web server to receive encryption keys and testing the ransomware on a victim's machine. The process includes editing source code, compiling the project, and decrypting files using a decryption tool.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What algorithm does the Hidden Tier ransomware use for file encryption?

RSA

DES

AES

Blowfish

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Where can you find the Hidden Tier ransomware project to download?

Bitbucket

GitHub

SourceForge

Google Drive

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of setting up a web server on the Kali machine?

To host the ransomware files

To receive encryption keys

To run Visual Studio

To store victim's data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can be modified in the source code to customize the ransomware?

The operating system

The file extensions and attack path

The encryption algorithm

The programming language

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What message is typically left for the victim in the text file?

A thank you note

A guide to decrypt files

Instructions to pay a ransom

A warning to update their software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the final step before executing the ransomware on the victim's machine?

Compiling the project

Setting up a firewall

Installing antivirus software

Creating a backup

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can the encrypted files be decrypted?

By using any decryption software

By contacting the software developer

By reinstalling the operating system

By using the hidden tier decryptor with the correct key