Cryptography
Binary Exploitation
Operating Systems Security
Malware
Memory
500

This hashing attack technique allows an attacker to generate a different input that produces the same hash output as a legitimate file, undermining integrity checks in systems that rely on weak hash functions like MD5.

What is a Collision attack?

500

This vulnerability occurs when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory and allowing execution of arbitrary code.

What is a Buffer Overflow?

500

This Linux kernel feature isolates processes by giving them separate views of system resources such as process IDs, networking, and mount points.

What are Linux namespaces?

500

This type of malware hides its presence by modifying system binaries, hooking kernel functions, and concealing processes from standard system tools.

What is a rootkit?

500

This class of bugs occurs when two threads access the same memory location without proper synchronization, leading to unpredictable behavior.

What is a race condition (concurrency vulnerability)?