Cryptography
Forensics
Reverse Engineering
PWN
Web
100

The number of bits in an MD5 hash

What is 128 bits

100

A technique used to conceal data inside of other mediums to avoid detection

What is steganography

100

Another name for a compiled program or piece of software

What is a binary

100

A common vulnerability that arises from improper use of printf()

What is format string vulnerbilties
100

The current number one web application security risk defined by OWASP

What is broken access control

200

First widely used encryption scheme to make use of public-key cryptography

What is RSA

200

A free and opensource digital forensics toolkit for analyzing disk images

What is Autopsy

200

Most common debugger used in Linux based systems

What is GDB

200

The deprecated C Standard Library function which reads a line from stdin into a buffer until either a terminating newline or EOF

What is gets()

200

Commonly used tool for analyzing and manipulating web requests, written in Java.

What is BurpSuite

300

A method of encryption considered perfectly secure which uses a single-use pre-shared key.

What is one-time pad

300

Common tool written in python for analyzing memory dumps

What is Volatility

300

Tool developed by the NSA and release to the public in 2018 for reverse engineering many different types of software

What is Ghidra

300

The beginning of the name of many heap exploitation techniques.
ie: ____ __ force

What is house
OR
What is house of

300
The username which most web applications run as on Linux systems

What is www-data
OR
What is httpd

400

A vulnerability in OpenSSL 1.0.1 which exploited a flaw in the TLS Heartbeat extension.

What is Heartbleed
400

The type of file created by Linux and UNIX systems when a program terminates abnormally

What is a core dump
OR
What is a core file

400

A method of modifying the behavior of a program permanently by modifying the static binary

What is binary patching

400

The number of bytes needed to completely overwrite the saved instruction pointer given that you have an arbitrary buffer overflow starting from RBP-128

What is 144 bytes

400

Early alternative to HTTP in the early 1990s created by Mark P. McCahill

What is the Gopher Protocol

500

Pseudo-random number generator created by the NSA which many believed to contain a backdoor

What is Dual EC DRBG

500

NIST publication which details how to integrate forensics techniques into Incident Response.

What is NIST SP 800-86
OR
What is NIST 800-86

500

The opcode of the smallest possible infinite loop in x86-64

What is 0xEBFE
OR
What is 0xFEEB

500

In x86-64 Linux, the 6 registers used for passing parameters to a syscall.

What is RDI, RSI, RDX, R10, R8, R9

500

A technique used to increase the likelihood of successfully triggering a race condition by eliminating jitter from interfering with the race window

What is a single-packet attack