The Black Hat Quiz 2014

How well do you know the security conference’s revelations about NSA, pwned cars, spying cell phones and more?

The Black Hat Quiz 2014

The Black Hat Quiz 2014

Black Hat draws the elite of the security world to one place and has earned a reputation for introducing shocking new security exploits, takeovers of seemingly secure gear, means of recruiting botnets and ways to steal identities. The flip side is that all of this malicious education can be used to help protect networks, devices and data. Here’s a brief set of questions about past Black Hats to test how well you know the contributions they have made to the infosec community. Keep track of your score and check at the end to see how well you did.

Black Hat

What device known as WASP rocked Black Hat 2011 by demonstrating it could grab Wi-Fi and cell phone signals, and launch DoS attacks against otherwise inaccessible targets?

Black Hat

What device known as WASP rocked Black Hat 2011 by demonstrating it could grab Wi-Fi and cell phone signals, and launch DoS attacks against otherwise inaccessible targets?

WASP - Wireless Aerial Surveillance Platform - is a surplus military drone equipped with off-the-shelf gear for intercepting or jamming cellular and Wi-Fi signals and launching attacks.

Black Hat

A 2010 Black Hat briefing about the Chinese Cyber-army was withdrawn from the conference after arm-twisting by whom?

Black Hat

A 2010 Black Hat briefing about the Chinese Cyber-army was withdrawn from the conference after arm-twisting by whom?

The government of Taiwan, which thought the talk might hurt improving relations with China.

Black Hat

What did then-NSA chief Gen. Keith Alexander seek from Black Hat attendees during his keynote address in 2013?

Black Hat

What did then-NSA chief Gen. Keith Alexander seek from Black Hat attendees during his keynote address in 2013?

Their help in making NSA surveillance more effective while protecting civil liberties in a post-Snowden world.

Black Hat

Which major tech company cancelled its first-ever Black Hat presentation in 2008 because “marketing got wind of it”?

Black Hat

Which major tech company cancelled its first-ever Black Hat presentation in 2008 because “marketing got wind of it”?

Apple, which finally made its appearance at Black Hat in 2012.

Black Hat

Why was Halvar Flake denied entry to the U.S. to present at Black Hat 2007?

Black Hat

Why was Halvar Flake denied entry to the U.S. to present at Black Hat 2007?

Flake’s printed training materials about safe coding in C and C++ aroused the suspicion of U.S. Customs, which then decided he didn’t have the right kind of visa.

Black Hat

Face-recognition software plus an algorithm can be used to perform what identity theft crime, according to Carnegie Mellon researcher Alessandro Acquisti’s 2011 Black Hat briefing?

Black Hat

Face-recognition software plus an algorithm can be used to perform what identity theft crime, according to Carnegie Mellon researcher Alessandro Acquisti’s 2011 Black Hat briefing?

Deducing a person’s Social Security number.

Black Hat

A threatened lawsuit against researcher Kristin Paget nixed her 2007 Black Hat Federal briefing about RFID because it promised what?

Black Hat

A threatened lawsuit against researcher Kristin Paget nixed her 2007 Black Hat Federal briefing about RFID because it promised what?

How to build an RFID cloning device to exploit RFID proximity cards.

Black Hat

Jerome Radcliffe opened up a new set of concerns at Black Hat 2011 by revealing how to hack what class of electronic device?

Black Hat

Jerome Radcliffe opened up a new set of concerns at Black Hat 2011 by revealing how to hack what class of electronic device?

Medical devices, specifically insulin pumps.

Black Hat

What method of stealing data from mobile phones and turning them into spy devices did Kindsight research director Kevin McNamee demonstrate at Black Hat 2013?

Black Hat

What method of stealing data from mobile phones and turning them into spy devices did Kindsight research director Kevin McNamee demonstrate at Black Hat 2013?

Injecting malware into seemingly innocent mobile applications.

Black Hat

What hack was deemed so threatening that the Department of Homeland Security demanded to vet a Black Hat 2011 briefing on it before it could be presented?

Black Hat

What hack was deemed so threatening that the Department of Homeland Security demanded to vet a Black Hat 2011 briefing on it before it could be presented?

Using phone services to take control of cars but also power grids.

Black Hat

How’d you do?

0-2 – Pwned

3-5 – Script kiddie

6-8 – Mildly dangerous

9-10 – Master cracker