icoa-cli 2.15.14 → 2.16.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -844,7 +844,7 @@ export function registerExamCommand(program) {
844
844
  printHeader('ICOA Demo Exam — Free Practice');
845
845
  console.log();
846
846
  console.log(chalk.white(' Free practice · No account needed · No time limit'));
847
- console.log(chalk.white(' 30 questions · Pick one answer per question'));
847
+ console.log(chalk.white(' 15 questions · Pick one answer per question'));
848
848
  console.log();
849
849
  printHowToPlay();
850
850
  console.log();
@@ -867,7 +867,7 @@ export function registerExamCommand(program) {
867
867
  console.log();
868
868
  console.log();
869
869
  saveExamState({ session, questions: DEMO_QUESTIONS, answers: {} });
870
- printKeyValue('Questions', '30');
870
+ printKeyValue('Questions', '15');
871
871
  printKeyValue('Duration', 'No time limit');
872
872
  // Show first question
873
873
  printQuestion(DEMO_QUESTIONS[0]);
@@ -8,13 +8,12 @@ export const DEMO_SESSION = {
8
8
  examName: 'ICOA Demo Exam — Free Practice',
9
9
  startedAt: '',
10
10
  durationMinutes: 0, // 0 = no time limit for demo
11
- questionCount: 30,
11
+ questionCount: 15,
12
12
  country: 'ALL',
13
13
  };
14
14
  export const DEMO_ANSWERS = {
15
- 1: 'B', 2: 'B', 3: 'C', 4: 'B', 5: 'C', 6: 'B', 7: 'B', 8: 'C', 9: 'C', 10: 'B',
16
- 11: 'C', 12: 'B', 13: 'B', 14: 'B', 15: 'B', 16: 'B', 17: 'B', 18: 'B', 19: 'C', 20: 'B',
17
- 21: 'A', 22: 'B', 23: 'B', 24: 'B', 25: 'B', 26: 'B', 27: 'B', 28: 'B', 29: 'A', 30: 'C',
15
+ 1: 'B', 2: 'B', 3: 'C', 4: 'C', 5: 'B', 6: 'B', 7: 'C', 8: 'B',
16
+ 9: 'B', 10: 'B', 11: 'B', 12: 'B', 13: 'B', 14: 'B', 15: 'C',
18
17
  };
19
18
  export const DEMO_QUESTIONS = [
20
19
  { number: 1, text: 'Which algorithm is NOT a symmetric cipher?', category: 'Cryptography',
@@ -23,59 +22,29 @@ export const DEMO_QUESTIONS = [
23
22
  options: { A: 'Buffer overflow in web server', B: 'Unsanitized user input in database queries', C: 'Weak encryption algorithms', D: 'Misconfigured firewall rules' } },
24
23
  { number: 3, text: 'Which HTTP status code indicates "Forbidden"?', category: 'Web Security',
25
24
  options: { A: '401', B: '404', C: '403', D: '500' } },
26
- { number: 4, text: 'What is the primary purpose of a nonce in cryptography?', category: 'Cryptography',
27
- options: { A: 'Encrypt data at rest', B: 'Prevent replay attacks', C: 'Generate random passwords', D: 'Compress data before encryption' } },
28
- { number: 5, text: 'Which tool is commonly used for network packet capture?', category: 'Network',
25
+ { number: 4, text: 'Which tool is commonly used for network packet capture?', category: 'Network',
29
26
  options: { A: 'Burp Suite', B: 'Ghidra', C: 'Wireshark', D: 'John the Ripper' } },
30
- { number: 6, text: 'What does XSS stand for in cybersecurity?', category: 'Web Security',
27
+ { number: 5, text: 'What does XSS stand for in cybersecurity?', category: 'Web Security',
31
28
  options: { A: 'Extended Security System', B: 'Cross-Site Scripting', C: 'XML Secure Socket', D: 'Cross-Server Sharing' } },
32
- { number: 7, text: 'What is the primary function of a firewall?', category: 'Network',
33
- options: { A: 'Encrypt network data', B: 'Filter network traffic based on security rules', C: 'Detect viruses in files', D: 'Speed up internet connection' } },
34
- { number: 8, text: 'Which type of malware disguises itself as legitimate software?', category: 'Malware',
29
+ { number: 6, text: 'Which type of malware disguises itself as legitimate software?', category: 'Malware',
35
30
  options: { A: 'Worm', B: 'Ransomware', C: 'Trojan', D: 'Adware' } },
36
- { number: 9, text: 'Which protocol provides secure communication on the web?', category: 'Network',
37
- options: { A: 'HTTP', B: 'FTP', C: 'HTTPS', D: 'SMTP' } },
38
- { number: 10, text: 'What is a cryptographic hash?', category: 'Cryptography',
39
- options: { A: 'A reversible encryption key', B: 'A one-way function producing a fixed-size digest', C: 'An authentication protocol', D: 'A type of digital signature' } },
40
- { number: 11, text: 'Which tool is used for binary analysis?', category: 'Reverse Engineering',
41
- options: { A: 'Nmap', B: 'SQLMap', C: 'Ghidra', D: 'Nikto' } },
42
- { number: 12, text: 'Which attack manipulates DNS requests to redirect traffic?', category: 'Network',
43
- options: { A: 'Phishing', B: 'DNS Spoofing', C: 'SQL Injection', D: 'Brute Force' } },
44
- { number: 13, text: 'What is the standard port for SSH?', category: 'Network',
31
+ { number: 7, text: 'What is the standard port for SSH?', category: 'Network',
45
32
  options: { A: '21', B: '22', C: '80', D: '443' } },
46
- { number: 14, text: 'What is two-factor authentication (2FA)?', category: 'Authentication',
33
+ { number: 8, text: 'What is a cryptographic hash?', category: 'Cryptography',
34
+ options: { A: 'A reversible encryption key', B: 'A one-way function producing a fixed-size digest', C: 'An authentication protocol', D: 'A type of digital signature' } },
35
+ { number: 9, text: 'What is two-factor authentication (2FA)?', category: 'Authentication',
47
36
  options: { A: 'Using two different passwords', B: 'Verifying identity with two distinct types of credentials', C: 'Encrypting data twice', D: 'Connecting through two networks' } },
48
- { number: 15, text: 'Which Linux command shows open ports on a system?', category: 'Linux',
37
+ { number: 10, text: 'Which Linux command shows open ports on a system?', category: 'Linux',
49
38
  options: { A: 'ls -la', B: 'netstat -tulpn', C: 'chmod 777', D: 'cat /etc/passwd' } },
50
- { number: 16, text: 'What is a Man-in-the-Middle (MitM) attack?', category: 'Network',
39
+ { number: 11, text: 'What is a Man-in-the-Middle (MitM) attack?', category: 'Network',
51
40
  options: { A: 'Accessing a server without authorization', B: 'Intercepting and modifying communications between two parties', C: 'Sending multiple requests to overload a server', D: 'Guessing passwords by brute force' } },
52
- { number: 17, text: 'Which of these is a hash algorithm?', category: 'Cryptography',
53
- options: { A: 'AES-256', B: 'SHA-256', C: 'RSA-2048', D: 'Diffie-Hellman' } },
54
- { number: 18, text: 'What is the principle of least privilege?', category: 'Security',
41
+ { number: 12, text: 'What is the principle of least privilege?', category: 'Security',
55
42
  options: { A: 'Give root access to all users', B: 'Grant only the permissions necessary to perform a task', C: 'Use the shortest password possible', D: 'Disable all firewalls' } },
56
- { number: 19, text: 'Which tool is commonly used for port scanning?', category: 'Network',
57
- options: { A: 'Wireshark', B: 'Metasploit', C: 'Nmap', D: 'Hashcat' } },
58
- { number: 20, text: 'What is ransomware?', category: 'Malware',
59
- options: { A: 'Software that shows unwanted ads', B: 'Software that encrypts files and demands payment to decrypt', C: 'Software that records keystrokes', D: 'Software that replicates across networks' } },
60
- { number: 21, text: 'What is the difference between symmetric and asymmetric encryption?', category: 'Cryptography',
61
- options: { A: 'Symmetric uses the same key to encrypt and decrypt; asymmetric uses two different keys', B: 'Symmetric is slower than asymmetric', C: 'Asymmetric only works with small files', D: 'There is no significant difference' } },
62
- { number: 22, text: 'Which vulnerability allows arbitrary code execution on a web server?', category: 'Web Security',
63
- options: { A: 'CSRF', B: 'Remote Code Execution (RCE)', C: 'Clickjacking', D: 'Open Redirect' } },
64
- { number: 23, text: 'What is OWASP?', category: 'Security',
65
- options: { A: 'A security operating system', B: 'An organization that publishes web security standards and guides', C: 'A type of firewall', D: 'A programming language for security' } },
66
- { number: 24, text: 'Which Linux command changes file permissions?', category: 'Linux',
67
- options: { A: 'chown', B: 'chmod', C: 'chgrp', D: 'passwd' } },
68
- { number: 25, text: 'What is an SSL/TLS certificate?', category: 'Cryptography',
69
- options: { A: 'A file containing malware', B: 'A digital document that verifies a website\'s identity', C: 'A private key for SSH', D: 'A type of encrypted database' } },
70
- { number: 26, text: 'Which of the following is a social engineering attack?', category: 'Security',
43
+ { number: 13, text: 'Which of the following is a social engineering attack?', category: 'Security',
71
44
  options: { A: 'Buffer overflow', B: 'Phishing', C: 'SQL Injection', D: 'Port scanning' } },
72
- { number: 27, text: 'What does the Linux command "grep" do?', category: 'Linux',
73
- options: { A: 'Compresses files', B: 'Searches for text patterns in files', C: 'Shows active processes', D: 'Configures the network' } },
74
- { number: 28, text: 'What is a VPN?', category: 'Network',
45
+ { number: 14, text: 'What is a VPN?', category: 'Network',
75
46
  options: { A: 'A type of virus', B: 'A virtual private network that encrypts internet traffic', C: 'A file transfer protocol', D: 'A vulnerability scanner' } },
76
- { number: 29, text: 'What is CSRF (Cross-Site Request Forgery)?', category: 'Web Security',
77
- options: { A: 'An attack that forces a user\'s browser to perform unauthorized actions', B: 'A data encryption method', C: 'A type of network scanner', D: 'A file compression technique' } },
78
- { number: 30, text: 'What is the best practice for storing passwords in a database?', category: 'Security',
47
+ { number: 15, text: 'What is the best practice for storing passwords in a database?', category: 'Security',
79
48
  options: { A: 'Plain text', B: 'Encrypted with AES', C: 'Hashed with salt', D: 'Encoded in Base64' } },
80
49
  ];
81
50
  /**
package/dist/repl.js CHANGED
@@ -181,7 +181,7 @@ export async function startRepl(program, resumeMode) {
181
181
  console.log(chalk.white(' Ready to start? Just type ') + chalk.bold.cyan('demo') + chalk.white(' and press ') + chalk.yellow('Enter') + chalk.white('!'));
182
182
  console.log();
183
183
  console.log(chalk.gray(' ─────────────────────────────────────────────'));
184
- console.log(chalk.bold.cyan(' demo') + chalk.gray(' Free practice exam (30 questions)'));
184
+ console.log(chalk.bold.cyan(' demo') + chalk.gray(' Free practice exam (15 questions)'));
185
185
  console.log(chalk.white(' exam <token>') + chalk.gray(' Enter exam with access token'));
186
186
  console.log(chalk.white(' lang es') + chalk.gray(' Switch language (15 supported)'));
187
187
  console.log(chalk.gray(' e.g. lang es (Español), lang zh, lang fr'));
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "icoa-cli",
3
- "version": "2.15.14",
3
+ "version": "2.16.0",
4
4
  "description": "ICOA CLI — The world's first CLI-native CTF competition terminal",
5
5
  "type": "module",
6
6
  "bin": {