Stores a memory address
What is a pointer
Ohm's law equation
What is V=IR
Movie that inspired Computer Fraud and Abuse Act (CFAA)
What is Wargames
Caused by insufficient bounds checking on a memory buffer
What is Buffer Overflow
A file used for telling a web scraper what files and folders it is not allowed to access
What is robots.txt
The programming language whose mascot is a crab
What is Rust
Why does the resistor symbol look like that. --/\/\/\--
What is increased electron pressure.
CIA stands for
(hint: NOT the agency)
What is Confidentiality Integrity Availability
Accessing a pointer after the memory is freed.
What is use after free
A list of the top 10 most common web application vulnerability categories
What is OWASP Top 10
Compiler used for building C programs
The minimum number of flip flops needed for an FSM with 10 states
What is 4 (One bit per flip flop)
Addressing the security concerns around a technology to prevent an incident from occurring in the future
What is risk management
A ROP technique commonly seen in beginner CTF challenges
What is ret2win
Tomcat is an example of one
What is a reverse proxy
Creator of the C programming language
Who is Dennis Ritchie
The logic being used for this gate
(Refer to image)
What is XOR
U.S. agency who sets the standards and policies of many industries including cybersecurity.
What is NIST
A ROP technique in which the C standard library is targeted to execute a malicious payload
What is ret2libc
The process of balancing requests across several instances of the same application
What is load balancing
The operator which is also a keyword in C
What is sizeof
The gain of a voltage follower
What is 1
FIPS 197
What is AES standard
The first byte of the stack canary
What is a null byte
A stateful protocol used for web applications that enables continuous, real-time communication between a client and server
What is WebSockets