Web
Digital Forensics
Cryptography
Reverse Engineering
Networking
100

This vulnerability takes input from a user and doesn't validate it.

What is SQL Injection?

100

Police in the United States must use procedures that adhere to this, in order to properly collect evidence.

What is the Fourth Amendment?

100

This kind of encryption is easy to bruteforce due to only having 255 key combinations.

What is Single Byte XOR Encryption?

100

This low-level programming language is commonly analyzed in reverse engineering due to its close relationship to machine code.

What is assembly language?

100

This protocol is used to retrieve email from a mail server.

What is POP3 (Post Office Protocol 3)?

200

If the path is controlled by user input and isn't sanitized, this vulnerability is possible.

What is Directory Traversal?

200

This proves physical possession of evidence.

What is Chain of Custody?

200

First described in 1882, this was first used to secure telegraphy.

What is a One Time Pad (OTP)?

200

This technique involves analyzing the binary code of a program to understand its behavior without having the source code.

What is binary analysis?

200

This layer of the OSI model is responsible for data formatting, encryption, and compression.

What is the Presentation layer?

300

This turns HTTP into HTTPS.

What is TLS/SSL?

300

This is the minimum storage unit of a hard drive.

What is a Sector?

300

If the files contents change in any way, this also changes.

What is the Hash?

300

This type of analysis examines malware in a controlled environment to understand its behavior and effects.

What is dynamic analysis?

300

This type of attack involves intercepting and altering communication between two parties without their knowledge.

What is a man-in-the-middle attack?

400

This screens incoming web requests and prevents malicious ones.

What is a Web Application Firewall?
400

This is where Windows stores data from RAM when it becomes full.

What is Pagefile.sys?
400

This hash function, widely used in internet security, produces a 160-bit hash value.

What is SHA-1?

400

This process involves translating machine code back into source code to understand the original logic of a program.

What is decompilation?

400

This protocol, part of the TCP/IP suite, is used to match an IP address to a corresponding hardware address.

What is ARP (Address Resolution Protocol)?

500

This security flaw arises from session tokens having poor randomness across a range of values.

What is Session Hijacking?

500
This is the most volatile level of storage within a computer.

What are the CPU Cache and Registers?

500

This widely-used encryption standard, adopted in 2001, replaced the Data Encryption Standard (DES).

What is the Advanced Encryption Standard (AES)?

500

This legal doctrine allows reverse engineering for interoperability purposes under certain conditions in the United States.

What is the DMCA (Digital Millennium Copyright Act) exemption?

500

This network topology connects each node to every other node, providing multiple paths for data to travel.

What is a mesh topology?

M
e
n
u