Into the Breach
Name That Injection
Creepy Crawlies
Roll Your Own Crypto
Port Imports
100

This content creation platform involuntarily went open-source when a recent breach leaked source code going back years

What is Twitch?

100

Robert'); DROP TABLE Students;--

What is SQL injection?

100

This anticipated glitch kept programmers up late on the night of December 31st, 1999

What is the Y2K bug?

100

This substitution cipher works by rotating letters a fixed number of places down the alphabet

What is ROT13?

100

Ports 80 and 443 are commonly used for sending data using this protocol

What is Hypertext Transfer Protocol (HTTP/HTTPS)?

200

This major supply chain attack was partly caused by an intern using the password [companyname]123

What is the SolarWinds breach?

200

<script>alert("pwned");</script>

What is cross-site scripting (XSS)?

200

This model of car used malicious software and physical devices to cheat federal emissions tests

What is the Volkswagen Beetle?

200

This widely used public-key cryptosystem relies on the difficulty of factoring prime numbers for its security

What is RSA?

200

Port 22 is the default port for this remote command line access protocol

What is Secure Shell (SSH)?

300

A data breach at this MySpace widget company offered password crackers an excellent dictionary by exposing millions of plaintext passwords

What is RockYou?

300

http://example.com/login?username[$ne]=pwned&password[$ne]=password

What is NoSQL injection?

300

This virus spreads affection and malicious code by emailing itself to everyone in its victims' Outlook address books

What is the ILOVEYOU worm?

300

This polyalphabetic substitution cipher created in the late Middle Ages uses a keyword to encrypt messages

What is the Vigenère cipher?

300

Port 25 is the default port for this email transmission protocol

What is Simple Mail Transfer Protocol (SMTP)?

400

Outdated software led to this major data breach that leaked birth dates and social security numbers of over 100 million Americans

What is the Equifax breach?

400

admin*)((|userpassword=*)

What is LDAP injection?

400

These bots, also known as web crawlers, are used by search engines like Google to index web pages

What are spiders?

400

This cryptocurrency, known for its focus on privacy, is speculated to be used in as many as 44% of ransomware attacks

What is monero?

400

Ports 137-139 and port 445 are commonly used for this Windows file sharing protocol

What is Server Message Block (SMB)?

500

This zero-day vulnerability in a major operating system was kept secret by the NSA for over five years

What is Eternal Blue?

500

() { :;}; echo pwned

What is Shellshock?
500

This early-internet era virus, which entered computers through a vulnerability in the Unix sendmail program, was written by the son of the NSA's chief security scientist

What is the Morris worm?

500

This cryptographically strong key derivation function is the industry standard for hashing passwords as recommended by RFC 8018

What is the Password-Based Key Derivation Function 2 (PBKDF2)?

500

This port number is popular among malware authors who want to show off their elite hacking skills

What is port 1337?