Secure Dependencies
HTTPS
Cookies!
OWASP Top 10
Industry Trivia
100

The acronym SCA stands for this practice of analyzing your third-party components (like npm or pip packages) for vulnerabilities.

What is software composition analysis?

100

The "S" in HTTPS, this protocol provides the encryption layer for HTTP.

What is TLS? Transport Layer Security

100

These cookie attributes restrict when the browser attaches the cookie when browsing the web.

What is domain or path?

100

This vulnerability, often number one on the OWASP list, allows an attacker to send hostile data to an interpreter, such as a database or the browser.

What is Injection?

100

This massive hacker conference, held in Las Vegas annually, is known for its Capture the Flag (CTF) competition and distinct "badges."

What is DEFCON?

200

This is a formal inventory of all the open-source libraries and versions used in your application.

What is a software bill of materials?

200

This HTTP status code, often misconfigured, might leak information about whether a username or just a password was incorrect.

What are 404 or 401 status codes?

200

This is the section of the Http request that includes cookie values?

What is the cookie header?

200

This flaw occurs when an application improperly manages session credentials or user identity.

What is broken authentication?

200

This former NSA contractor leaked a massive trove of classified documents in 2013, revealing global surveillance programs.

Who is Edward Snowden?

300

An attack where a hacker compromises a legitimate, popular package and adds malicious code to a new version, which is then downloaded by thousands of apps.

What is a supply chain attack?

300

This http method should not be used to modify state

What is GET?

300

This cookie flag prevents client-side JavaScript (e.g., document.cookie) from accessing the cookie, which is a key defense against XSS.

What is HttpOnly?
300

This vulnerability arises from not properly restricting what a user is allowed to do, letting them access other users' data or admin functions.

What is broken access control? (Authorization)

300

Once the FBI's "most wanted computer criminal," this famous social engineer was arrested in 1995 and later became a well-known security consultant and author.

Who is Kevin Mitnick?

400

An attack where a hacker uploads a malicious package named requestss or djanga hoping a developer will make a typo during npm install.

What is typosquatting?

400

This security header, HSTS, instructs the browser to only communicate with the server over HTTPS, preventing SSL stripping attacks.

What is Strict Transport Security?

400

This cookie flag ensures the browser will only send the cookie over an HTTPS connection.

What is the Secure flag?

400

This category was newly added in the 2021 OWASP Top 10. This vulnerability tricks a server into making a network request on the attacker's behalf, often to scan the internal network or query cloud metadata.

What is SSRF? (Server Side Request Forgery)

400

This "bug bounty" program, run at conferences, offers large cash prizes to researchers who can successfully demonstrate zero-day exploits against popular software and hardware, often "owning" devices.

What is Pwn2Own?
500

This advanced attack tricks a build system by publishing a public package (e.g., on npm) with the same name as an internal-only private package.

What is dependency confusion?

500

This outdated security protocol was used in the secure transfer of http requests and was replaced by TLS.

What is SSL? (Secure Sockets Layer)

500

This cookie attribute (with values Strict or Lax) is the primary browser-level defense against Cross-Site Request Forgery (CSRF).

What is the Same-site attribute?

500

This category, new in 2021, describes flaws in an application's architecture (like business logic) that create security risks, even if the code itself has no "bugs."

What is insecure design?
500

This open-source framework, now owned by Rapid7, is an essential tool for penetration testers, providing a vast database of exploits and payloads.

What is the Metasploit Framework?