- What is a One-Time Pad? Provide the formula, an advantage, and a disadvantage.
- What is a block cipher mode? Can you describe a mode of your choice?
- Compare HMAC-SHA3 with RSA-based digital signatures in terms of integrity, confidentiality, and non-repudiation.
- What are the four main primitives used in a round of AES? Provide their names and a one-sentence description of each.
- Why is authentication of Diffie-Hellman key exchange parameters important?
- Explain Kerckhoff’s principle.
- What is a digital certificate, and how is it used in HTTPS? Who issues and verifies it? What attacks can occur if certificates are not used?
- What is a downgrade attack in cryptographic protocols, and how can it be prevented?
- What kind of attack is possible with the given C program (typically a buffer overflow scenario)? Provide a short input that will crash the program.
- Assume an attacker has control over user input in a vulnerable C program. How can they exploit it? Describe the necessary steps.
- Describe three common countermeasures to prevent buffer overflow attacks (e.g., stack canaries, ASLR, DEP).
- What is return-oriented programming (ROP), and how can it be used in exploits?
- How do canaries work in protecting against buffer overflows?
- What are heap-based overflows, and how can they be mitigated?
- How does Address Space Layout Randomization (ASLR) help against memory corruption vulnerabilities?
- What is a cookie, and why is it necessary? Describe its purpose and function.
- What is the Same-Origin Policy (SOP), and why is it important?
- What is SQL injection, and how can it be exploited? Provide an example.
- Convert the given vulnerable SQL query into a secured, parameterized query.
- What is a server-side persistent XSS attack? Provide an example.
- What is DNSSEC, and what are its three main goals?
- Explain how Content Security Policy (CSP) helps mitigate XSS attacks.
- What is a Denial-of-Service (DoS) attack, and what are two types of DoS attacks?
- What is a firewall, and how does it decide which traffic to allow or block?
- What is a VPN, and how does it differ from onion routing (e.g., Tor)?
- What is a Tor bridge, and why would someone use it?
- What is an onion service, and what does it protect against?
- What is an amplified DDoS attack, and how does it work?
- Explain how DNS poisoning attacks via response spoofing work.
- What is the most secure authentication mechanism on modern smartphones? What is the threat model and use case?
- What are the weaknesses of static biometrics? Provide three arguments.
- What is the concept of an anonymity set? Provide an example.
- How does circuit construction and communication work in Tor?
- What is steganography, and how is it used? Provide an example.