A common vulnerability that uses unsanitized user input in its SQL queries.
What is SQL Injection?
Creator of both the Linux kernel and the 'Git' SCM tool.
Who is Linus Torvalds?
Enterprise administration service used to manage groups of Windows computers. Can handle authentication, policy management, and software management.
What is Active Directory?
This agency is responsible for improving & maintaining cybersecurity across all U.S government infrastructre. Don't get it confused with the acronym for the head of IT security in a corporation!
What is CISA (Cybersecurity and Infrastructure Security Agency)?
This pen-testing framework developed by Rapid7 is a suite of many different exploits aimed to facilitate attackers' entry into networks as well as their lateral movement.
What is Metasploit?
First documented in 1972, this vulnerability is one of the oldest in executable programs. It is present when user-controlled data overwrites adjacent memory content, often due to bad code written by the developer.
What is a buffer overflow vulnerability?
This distribution of Linux is infamous for its difficulty to install and the ego of its users.
What is Arch Linux?
Hashing algorithm used since Windows 2000. Considered cryptographically insecure, despire being the "version 2"
What is NTLM(v2)?
This foundation maintains open-source information primarily on securing web applications, most notable for their "Top Ten" list that highlights the most critical application security risks.
What is OWASP (Open Worldwide Application Security Project)?
Named after a rude thing to do at the dinner table, this web pen-testing software offers a sleek UI to monitor website interactions and launch many different attacks.
What is Burp Suite?
This kind of vulnerability appears when unchecked user input is passed directly into a function like printf() without a "template" argument to tell the program what to do with it.
What is a format string vulnerability?
This kind of kernel likely saw its largest use in the launch of the Nintendo Switch's 'Horizon' OS. It is the antithesis to many OS' monolithic kernels.
What is a microkernel?
Database of low-level Windows system settings and other data, available for the user to view and/or modify (with appropriate permissions, of course).
What is the Registry?
This institute hosts the Internet Storm Center and numerous trainings for cybersecurity related topics. Despite the name, they have quite a bit of content.
What is SANS (SysAdmin, Audit, Network, Security)?
This disk image forensics tool is equally associated with dobermans and rottweilers as it is the morgue.
What is Autopsy? (also accepts SleuthKit)

This vulnerability arises when multiple code paths run at the same time and access the same memory, leading to undetermined behavior. Infamously responsible for the Therac-25 radiotherapy incidents.
What is a race condition?
This West-coast university created the BSD kernel, several decades before Linux. They are also credited with implementing process forking, virtual memory, and developing the text editor Vi.
What is the University of California, Berkley?
The "true" Administrator account on a Windows system, not easily achievable by a user, but serves as the real highest permission entity on any given Windows machine.
What is NT AUTHORITY\SYSTEM?
3-letter organization that maintains several different programs, the most prominent of which provides cybersecurity services to state and local governments, but notably isn't a government institution itself.
What is the CIS (Center for Internet Security)?
This command-line web fuzzer was written and Go, and contains 3 F's in the name!
What is FFuF (Fuzz Faster u Fool)?
A denial-of-service attack that tricks XML parsers into resolving an exponential number of objects (typically 10^9). But don't let the name fool you, there's nothing funny about it!
What is the billion-laughs attack?
Mid-1980s Unix OS developed by Bell Labs, the first to feature a windowing system and GUI instead of terminal-based I/O. (And the best OS mascot ever!)

What is Plan 9 From Bell Labs?
This process is a frequent target by attackers because it holds password hashes and other sensitive credential information.
What is LSASS?
This professional development association is responsible for IT governance skill development, like certifications, training, and exclusive membership. Primarily made up of CISOs and other high-level cybersecurity employees.
What is ISACA (Information Systems Audit and Control Association)?
Originally named Ethereal, after its creator left his old job he had to change its name to this aquatic-themed one.