Penetration tester sollicitatievragen


Sollicitatievragen voor een Penetration Tester gedeeld door sollicitanten

Meest gestelde sollicitatievragen

Sorteren: Relevantie|Populair|Datum
Early Warning Services
Er werd een Penetration Tester gevraagd...21 maart 2016

How do you start metasploit?

2 antwoorden

Type msfconsole in terminal. To launch it with a resource script, mfsconsole -r nameofscript.rc Minder


Hewlett Packard Enterprise | HPE

Why HP?

2 antwoorden

Because HP stands for Happy Place.

This looks so good:


What would you like to do in five years from now?

2 antwoorden

After five years i am ceo of your company .

This was a tricky question. The manager wanted to see if my answer is in line with the career path offered by the advanced security group at E n Y Minder


Technical question: networking security, application security, general penetration testing. Behavioural question: How to work in a group?, How it lead a team?, etc

2 antwoorden

hey hello "> hey"> hey '> /> hey


Early Warning Services

Is DNS TCP / UDP protocol?

1 antwoorden

It's a trick questions. It is both


What is the main difference between processes and threads?

1 antwoorden

Threads share the same memory allocated


What vulnerabilities could you find in a website?

1 antwoorden

Front end vulnerabilities that could be bypassed easily in some cases by eliminating javascript code or back end vulnerabilities such as unsanitized input. Minder


Please explain your career and what you hope to gain at Smartsheet

1 antwoorden

Explain my career: - Identify vulnerability as much as possible (in scope) - Recommend to other team how to fix the issue What I hope to gain at Smartsheet?: Ans: Well, all of my penetration tester experience I work at vendor company. I never work at customer company before. I want to challenge myself that all of experience that work with multiple type of customer organization could improve the security at Smartsheet. Minder

Axxum Technologies

Name some of the top 10 OWASP Web Application Vulnerabilities and describe them in layman's terms.

1 antwoorden

I named the top one SQL Injection, the third, XXS and one of the lower ones CSRF. I could have done a better job describing them - I was told in a phone call afterwards. Minder

1. What ports are used for Active Directory?

1 antwoorden

At the time, Offensive Security of pre-2019 did not teach us Active Directory, but I quickly learned that since AD is built on top of standard SMB (Server Message Block), you can use techniques like overpassing-the-hash and passing-the-ticket to get a TGT (Ticket Granting Ticket), then attempt to crack the hashes of a different user that may be domain-joined. By compromising the other domain-joined user, you can then begin enumerating other users of the domain and hopefully leak information from the domain controller. Furthermore, you can use malicious SMB shares to spread malware as hta macro payloads in Word documents to trick the client's employees into loading them. Outside of using tools like Responder to coordinate with SMB relays, or generating MOF files and adding them to the share, or using SMB named pipe exploits to compromise domain-joined users as a non-domain-joined user. Minder

Weergave: 1 - 10 van 184 sollicitatievragen