Tools
Attacks
Vulnerabilities
100

What pentesting tool is used to intercept and modify HTTP and HTTPS traffic between a client and server?

Burp Suite

100

What is the term for sending fraudulent SMS messages to trick users into sharing sensitive information?

Smishing

100

This term refers to software flaws that can be exploited by attackers.

Bugs or software vulnerabilities

200

This popular tool is used to perform network discovery and security auditing.

Nmap

200

What attack involves intercepting and altering communication between two parties without their knowledge?

Man-in-the-Middle (MITM)

200

What vulnerability arises when a mobile app fails to properly validate user input, allowing SQL injection attacks?

Improper Input Validation

300

This framework is widely used for developing and executing exploit code against a remote target machine.

Metasploit

300

What attack targets mobile apps by injecting malicious code into their runtime environment?

Dynamic Code Injection

300

This type of vulnerability occurs when user input is not properly validated, leading to code execution.

Remote code execution (RCE)

400

This Linux distribution is preloaded with security tools and used by penetration testers.

Kali Linux

400

What is the term for an attack where an attacker decompiles a mobile app to discover sensitive information like API keys or credentials?

Reverse Engineering

400

What is the risk of using outdated libraries or SDKs in mobile application development?

Vulnerabilities in Third-Party Components

500

This password cracking tool uses dictionary, brute-force, and rainbow table attacks.

John the Ripper

500

This attack exploits trust between a website and a user’s browser to perform unauthorised actions.

Cross-Site Request Forgery (CSRF)

500

This class of vulnerability involves exploiting buffer boundaries to overwrite memory. 

Buffer Overflow

M
e
n
u