Sploitables
*nix!
Windows Components
Institutionalized
Tool Time
200

A common vulnerability that uses unsanitized user input in its SQL queries.

What is SQL Injection?

200

Creator of both the Linux kernel and the 'Git' SCM tool.

Who is Linus Torvalds?

200

Enterprise administration service used to manage groups of Windows computers. Can handle authentication, policy management, and software management.

What is Active Directory?

200

This agency is responsible for improving & maintaining cybersecurity across all U.S government infrastructre. Don't get it confused with the acronym for the head of IT security in a corporation!

What is CISA (Cybersecurity and Infrastructure Security Agency)?

200

This pen-testing framework developed by Rapid7 is a suite of many different exploits aimed to facilitate attackers' entry into networks as well as their lateral movement.

What is Metasploit?

400

First documented in 1972, this vulnerability is one of the oldest in executable programs. It is present when user-controlled data overwrites adjacent memory content, often due to bad code written by the developer.

What is a buffer overflow vulnerability?

400

This distribution of Linux is infamous for its difficulty to install and the ego of its users.

What is Arch Linux?

400

Hashing algorithm used since Windows 2000. Considered cryptographically insecure, despire being the "version 2"

What is NTLM(v2)?

400

This foundation maintains open-source information primarily on securing web applications, most notable for their "Top Ten" list that highlights the most critical application security risks.

What is OWASP (Open Worldwide Application Security Project)?

400

Named after a rude thing to do at the dinner table, this web pen-testing software offers a sleek UI to monitor website interactions and launch many different attacks.

What is Burp Suite?

600

This kind of vulnerability appears when unchecked user input is passed directly into a function like printf() without a "template" argument to tell the program what to do with it.

What is a format string vulnerability?

600

This kind of kernel likely saw its largest use in the launch of the Nintendo Switch's 'Horizon' OS. It is the antithesis to many OS' monolithic kernels.

What is a microkernel?

600

Database of low-level Windows system settings and other data, available for the user to view and/or modify (with appropriate permissions, of course).

What is the Registry?

600

This institute hosts the Internet Storm Center and numerous trainings for cybersecurity related topics. Despite the name, they have quite a bit of content.

What is SANS (SysAdmin, Audit, Network, Security)?

600

This disk image forensics tool is equally associated with dobermans and rottweilers as it is the morgue.

What is Autopsy? (also accepts SleuthKit)

800

This vulnerability arises when multiple code paths run at the same time and access the same memory, leading to undetermined behavior. Infamously responsible for the Therac-25 radiotherapy incidents.

What is a race condition?

800

This West-coast university created the BSD kernel, several decades before Linux. They are also credited with implementing process forking, virtual memory, and developing the text editor Vi.

What is the University of California, Berkley?

800

The "true" Administrator account on a Windows system, not easily achievable by a user, but serves as the real highest permission entity on any given Windows machine.

What is NT AUTHORITY\SYSTEM?

800

3-letter organization that maintains several different programs, the most prominent of which provides cybersecurity services to state and local governments, but notably isn't a government institution itself.

What is the CIS (Center for Internet Security)?

800

This command-line web fuzzer was written and Go, and contains 3 F's in the name!

What is FFuF (Fuzz Faster u Fool)?

1000

A denial-of-service attack that tricks XML parsers into resolving an exponential number of objects (typically 10^9). But don't let the name fool you, there's nothing funny about it!

What is the billion-laughs attack?

1000

Mid-1980s Unix OS developed by Bell Labs, the first to feature a windowing system and GUI instead of terminal-based I/O. (And the best OS mascot ever!)

What is Plan 9 From Bell Labs?

1000

This process is a frequent target by attackers because it holds password hashes and other sensitive credential information.

What is LSASS?

1000

This professional development association is responsible for IT governance skill development, like certifications, training, and exclusive membership. Primarily made up of CISOs and other high-level cybersecurity employees.

What is ISACA (Information Systems Audit and Control Association)?

1000

Originally named Ethereal, after its creator left his old job he had to change its name to this aquatic-themed one.

What is Wireshark?