These questions have no right and wrong answer. They should allow the candidate to provide full responses. The interviewers here are not just looking for complete answers but also keeping track of HOW a candidate responds (rambles, gets distracted, doesn't answer the question, etc.).
- Do you have a blog and, if so, what is the URL? @digininja
- Do you contribute to open source projects and, if so, which and at what level? @digininja
- How do you participate in the information security community? @jsntkndy
- What conferences do you attend? @digininja
- What conferences have you spoken at? @digininja
- Name a couple of people in the industry that you'd look to for advice/trust their advice. Asking this to make sure they are active and know who does what, if they are claiming to be wifi experts and don't name people like Josh Wright then they are lying. @digininja
- What methods or sources of information do you use for keeping up to date in the security industry? jstnkndy
- If you could have any job in infosec, what would it be an why? @webbreacher
- What is the coolest thing you have done in infosec? @webbreacher
- Why would you like to work here? @webbreacher
- Describe how you learn best? @webbreacher
- You are performing a blackbox penetration test for a client. The only allowable attack vectors are network and application level attacks. Where do you start? @jstnkndy
- Describe how you would find all domains associated with the client (if they didn’t answer)
- Describe how you would find all network ranges associated with the client. (if they didn’t answer)
- During the penetration test you find an instance of Outlook Web Access belonging to the client. Describe how you would attack this. @jstnkndy
- Describe how you would find potential usernames to use. (if they didn’t answer)
- Describe how you would pick which passwords to use. (if they didn’t answer)
- Describe how you would avoid account lockouts. (if they didn’t answer)
- If you run the following scan without root privileges, describe what would happen:
nmap www.google.com
@jstnkndy- What kind of scan was performed? (if they didn’t answer)
- How many ports were scanned? (if they didn’t answer)
- If you ran the same command as root, describe the differences. (if they didn’t answer)
- You are launching a Metasploit reverse https meterpreter payload against a host that you know is vulnerable to your attack, but once you type “exploit” nothing happens after it launches the attack, how would you debug this (or what would you change to get your meterpreter session?) @jstnkndy
-
- You have successfully initiated a meterpreter session against a Windows host. What type of post exploitation do you perform? @jstnkndy
- How would you extract the local password hashes?
- How would you gather cleartext credentials from the machine?
- You attempt to run mimikatz but error occurs, how do you debug this? (or what would you do to try and fix the error?)
- Using the same meterpreter session as previous, you are able to dump the local machine hashes, describe what you would do with these. @jstnkndy
- You are performing an onsite penetration test. You do not want to perform any active scanning. How would you gather credentials? @jstnkndy
- Suppose you have physical access to a machine on a corporate domain that you are testing. It is connected to their network. You don't have credentials for the domain or local machine. You also have your own laptop. How would you begin testing? jstnkndy
- How would you avoid anti virus?
- How would you target a database that you know lies behing a jump server with an unkown IP address?
- What are commonly vulnerable ports/services/applications?
- You have unprivileged Windows credentials, how can you elevate your privileges?
- How can SQL Injection lead to remote code execution?
- What is the relevance of WPAD on a penetration test and how can it be leveraged? jstnkndy
- You are performing an application penetration test and you come across a Java applet, describe what you might do with it. jstnkndy
- What would you inject into an HTML page of a victim to get their Windows computer to send you their password hashes? jstnkndy
- What tests you would perform in the following scenarios: suppose you are assessing an application, the “forgot password” process consists of 3 steps: jstnkndy
- Enter your username
- Answer 3 security questions
- Set a new password
- You have found Local File Inclusion in a .php file on a webserver; you want to read the file contents of the local file config.php file on the webserver but the code is being interpreted. How do you gain access to the file contents of config.php? @jstnkndy
- How would you turn a Local File Inclusion against a Linux host into Command Execution? @jstnkndy
- Describe how and where in an application you might test for username enumeration. @jstnkndy
- Are there any security concerns with scoping an authorization cookie to the parent domain? jstnkndy
- On a Linux host running MySQL, how would you go about gaining command execution leveraging SQL Injection? jstnkndy
- Describe how you can perform Man-In-The-Middle (MITM) attacks (to view and tamper with the traffic) against mobile devices. @webbreacher