Coder Social home page Coder Social logo

kh4sh3i / penetration-testing-interview-questions Goto Github PK

View Code? Open in Web Editor NEW
30.0 2.0 6.0 12 KB

Penetration Testing Interview Questions

License: Creative Commons Zero v1.0 Universal

application application-security interview interview-questions penetration-testing penetration-testing-tools pentest pentesters pentesting security

penetration-testing-interview-questions's Introduction

Penetration Testing Interview Questions

Penetration Testing Interview Questions

General

  • What are the phases in the penetration testing lifecycle? (recon,scan,..)
  • What types of penetration testing assessments are there? (Internal/External Infrastructure Penetration Testing / Wireless/Web/mobile)
  • Difference between active and passive reconnaissance ?
  • How are penetration tests classified?
  • What types of penetration testing teams are there and what are their responsibilities?
  • What are some of the types of attackers? (Script kiddie/ APT/ Malicious insider)
  • What are the most common types of malware?
  • What are some of the most common vulnerability databases? (NVD/CVE/exploit db/packetstorm/vulnhub)
  • What is the Common Vulnerability Scoring System?
  • How would you rate vulnerabilities during a penetration test? (risk matrix)
  • At what point of an assessment would you start performing testing?
  • What are some of the most common vulnerabilities?
  • What is the principle of least privilege?

Infrastructure/Operating Systems

  • What is the OSI model and what are its layers?
  • What is the difference between TCP and UDP?
  • What are some of the most common services and what ports do they run on?
  • What is DNS?
  • What is ARP?
  • What is RDP?
  • What is a MAC address?
  • What is a firewall and how does it work?
  • What is the difference between an IDS and an IPS?
  • What are honeypots?
  • What is the difference between encoding, hashing and encrypting?
  • Name a few type of encoding, hash and encryption
  • What is salting and what is it used for
  • What is the fastest way to crack hashes?
  • Difference between symmetric and asymmetric encryption
  • In what format are Windows and Linux hashes stored
  • Where are Windows and Linux hashes stored, how can you retrieve them?
  • What are cron jobs/scheduled tasks?
  • Where are cron jobs stored in Windows and Linux?
  • What are the different package managers used in Linux and where are they used?
  • Describe the permission system used in Linux file systems
  • What are SUID and sudo?
  • What is Kerberos and how does it perform authentication?
  • What is the difference between WEP, WPA and WPA2
  • What is WPS? Why is it insecure?

Common Techniques & Attacks

  • How can DNS and ARP be exploited by attackers?
  • What is DDoS?
  • What is buffer overflow?
  • What is packet inspection?
  • What is privilege escalation? Provide a few examples
  • What is the difference between bruteforce and dictionary attacks?
  • What is a golden ticket attack?
  • What is a common misconfiguration of FTP and SMB? (anonymous login/ null session)

Web Application Vulnerabilities & Attacks

  • what is XSS, what types of XSS are there, what are the consequences of a successful attack and how do you prevent XSS?
  • What is SQL Injection, different types and examples, how to prevent ?
  • Secure and HTTPOnly flags
  • What is CSRF, what does it entail and how can it be prevented?
  • What is IDOR, what are its consequences and how can you prevent it?
  • What are LFI and RFI and what are the consequences of these attacks? How can they be prevented?
  • How can you secure data in transit?

Penetration Testing Tools

  • What tool would you use to perform a port scan?
  • What tools would you use to inspect network packets?
  • What tool would you use to bruteforce passwords, online and offline?
  • What tool would you use to automate SQL injection attacks?
  • What tool would you use to perform an ARP spoofing attack? (Ettercap)
  • What tools would you use to perform testing against WiFi networks
  • What tool can help generate malicious executables?
  • What tools would you use to scan a network for known vulnerabilities?
  • What tool would you use to inspect the route between a host and a destination?

Scenario-Based

  • How would you remotely access a service that can only be accessed from within an internal network?
  • How would you allow regular users to run bash scripts as root and which way is most secure? (cron jobs)
  • If you were able to obtain an NTLM hash but could not decrypt it, how would you use this knowledge to obtain access to the target host? (pHT)
  • What measures would you put in place to prevent brute forcing?

refrences

penetration-testing-interview-questions's People

Contributors

kh4sh3i avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.