This vulnerability takes input from a user and doesn't validate it.
What is SQL Injection?
Police in the United States must use procedures that adhere to this, in order to properly collect evidence.
What is the Fourth Amendment?
This kind of encryption is easy to bruteforce due to only having 255 key combinations.
What is Single Byte XOR Encryption?
This low-level programming language is commonly analyzed in reverse engineering due to its close relationship to machine code.
What is assembly language?
This protocol is used to retrieve email from a mail server.
What is POP3 (Post Office Protocol 3)?
If the path is controlled by user input and isn't sanitized, this vulnerability is possible.
What is Directory Traversal?
This proves physical possession of evidence.
What is Chain of Custody?
First described in 1882, this was first used to secure telegraphy.
What is a One Time Pad (OTP)?
This technique involves analyzing the binary code of a program to understand its behavior without having the source code.
What is binary analysis?
This layer of the OSI model is responsible for data formatting, encryption, and compression.
What is the Presentation layer?
This turns HTTP into HTTPS.
What is TLS/SSL?
This is the minimum storage unit of a hard drive.
What is a Sector?
If the files contents change in any way, this also changes.
What is the Hash?
This type of analysis examines malware in a controlled environment to understand its behavior and effects.
What is dynamic analysis?
This type of attack involves intercepting and altering communication between two parties without their knowledge.
What is a man-in-the-middle attack?
This screens incoming web requests and prevents malicious ones.
This is where Windows stores data from RAM when it becomes full.
This hash function, widely used in internet security, produces a 160-bit hash value.
What is SHA-1?
This process involves translating machine code back into source code to understand the original logic of a program.
What is decompilation?
This protocol, part of the TCP/IP suite, is used to match an IP address to a corresponding hardware address.
What is ARP (Address Resolution Protocol)?
This security flaw arises from session tokens having poor randomness across a range of values.
What is Session Hijacking?
What are the CPU Cache and Registers?
This widely-used encryption standard, adopted in 2001, replaced the Data Encryption Standard (DES).
What is the Advanced Encryption Standard (AES)?
This legal doctrine allows reverse engineering for interoperability purposes under certain conditions in the United States.
What is the DMCA (Digital Millennium Copyright Act) exemption?
This network topology connects each node to every other node, providing multiple paths for data to travel.
What is a mesh topology?