Application Security Testing
Software Vulnerabilities
Access/Privacy
Laws and Compliance
General Stuff
100

This form of testing focuses PRIMARILY on identifying and diagnosing weaknesses in a system

What is a vulnerability assessment?

100

This attack causes code from one user to be run on the same system as another.

What is XSS (Cross Site Scripting)?

100

This process focuses on verifying the user's identity integrity.

What is authentication?

100

These controls are put in place for compliance when either other controls fail, or when you're creating a bridge to get into compliance. 

What are Compensating controls?

100
Generally, this thing should never EVER be trusted.

What is user input?

200

These five steps (in order) are the protocol that penetration testers follow when looking for vulnerabilities.

What are Scoping, Recon, Discovery, Exploitation, and Reporting?

200

This vulnerability happens when a given system exceeds the amount of data it can handle and starts overwriting adjacent memory locations.

What is buffer overflow?

200

This process requires users to authenticate using multiple forms of verification.

What is Multi-Factor Authentication?

200

This standard manages data security around payment forms.

What is PCI-DSS?

200

These three measures are used for authentication- based on the 'something you...'

What are:

-Something you know

-Something you are

-Something you have

300

This type of penetration testing aims to compromise a trusted actor with some amount of privilege in a system.

What is social engineering?

300

Believing they are installing 'nmap', a user types 'sudo apt install mmap' into their terminal, unintentionally exposing them to this type of vulnerability.

What is Software Supply Chain Failure?

300
This model controls access to a system based on a user's role.
What is RBAC? (Role Based Access Control)
300

This form of control focuses on controlling processes you follow and documentation.

What is Administrative control?
300

This government repository holds a list of current vulnerabilities.

What is the NVD? (National Vulnerability Database)

400

We used Burpsuite and ZAP to implement this system, which intercepts requests coming in and out of the client to the server.

What is a Proxy?

400
Both SQL Injection and Path Injection are centered around attacking this target.

What is Server?

400

This models makes user's verify integrity through a separate channel of communication.

What is out-of-band authentication?

400

This European law contains 'the right to be forgotten'.

What is GDPR?

400

This must always be obtained before performing ANY vulnerability assessment. 

What is permission?

500

This occupation is focused on defending cyber systems from active attack, and further fortifying systems.

What is blue team?

500

This vulnerability can occur when two processes need access shared data in a very specific sequence.

What is a race condition vulnerability?

500

This identifier collects information about a user's online activity based on factors such as the browser type, operating system, screen resolution.

What is a browser fingerprint?

500

These two organizations provide frameworks for organizations to achieve compliance.

What are ISO and NIST?

500
List two things you should keep in mind while developing secure software.
You get points here if you list two good things!
M
e
n
u