GithubHelp home page GithubHelp logo

offensiveinterview's People

Contributors

cdiaz1971 avatar deedasmi avatar farzinenddo avatar leesoh avatar morgoroth avatar prodigysml avatar webbreacher avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

offensiveinterview's Issues

Ameer Mashkour

I am not sure if this is helpful but what do you think about asking questions on "recent" prominent attacks. For example:

  • Explain in details how the "Great Cannon" of China was used to DDoS Github
  • How does Logjam work and how is it different from FREAK?

The interviewee's answers may indicate how closely he/she follows technical reports on latest attacks beyond the headlines.

dakahuna

  1. to explain how they would determine how much space they would have for their payload in an exploit?
  2. to explain their approach to determining whether an application is vulnerable or not?

blog/contributions

Where is your blog?
What projects do you contribute to?
What conferences do you attend?
What conferences have you spoken at?
Name a couple of people in the industry that you'd look to for advice/trust their advice. - Asking this to make sure they are active and know who does what, if they are claiming to be wifi experts and don't name people like Josh Wright then they are lying.

From jstnkndy

  1. You are performing a blackbox penetration test for a client. The only allowable attack vectors are network and application level attacks. Where do you start?
    a. Describe how you would find all domains associated with the client (if they didn’t)
    b. Describe how you would find all network ranges associated with the client. (if they didn’t)
  2. During the penetration test you find an instance of Outlook Web Access belonging to the client. Describe how you would attack this.
    a. Describe how you would find potential usernames to use. (if they didn’t)
    b. Describe how you would pick which passwords to use. (if they didn’t)
    c. Describe how you would avoid account lockouts. (if they didn’t)
  3. If you run the following scan without root privileges, describe what would happen: nmap www.google.com
    a. What kind of scan was performed? (if they didn’t answer)
    b. How many ports were scanned? (if they didn’t answer)
    c. If you ran the same command as root, describe the differences. (if they didn’t answer)
  4. When running an nmap scan, what source port can you specify to scan from to commonly bypass firewall rules?
  5. You are launching a Metasploit reverse https meterpreter payload against a host that you know is vulnerable to your attack, but once you type “exploit” nothing happens after it launches the attack, how would you debug this (or what would you change to get your meterpreter session?)
  6. You have successfully initiated a meterpreter session against a Windows host. What type of post exploitation do you perform?
    a. How would you extract the local password hashes?
    b. How would you gather cleartext credentials from the machine?
    c. You attempt to run mimikatz but error occurs, how do you debug this? (or what would you do to try and fix the error?)
  7. Using the same meterpreter session as previous, you are able to dump the local machine hashes, describe what you would do with these.
  8. You are performing an onsite penetration test. You do not want to perform any active scanning. How would you gather credentials?
  9. What kind of attack is ARP Spoofing considered and how could you leverage it on a penetration test?
  10. You have found Local File Inclusion in a .php file on a webserver; you want to read the file contents of the local file config.php file on the webserver but the code is being interpreted. How do you gain access to the file contents of config.php?
  11. How would you turn a Local File Inclusion against a Linux host into Command Execution?
  12. Explain what NBNS poisoning is and how it can be leveraged on a penetration test.
  13. Describe what SQL Injection is and how you would test for it?
    a. What about Blind SQL Injection? (if they didn’t answer already)
    b. On a Linux host running MySQL, how would you go about gaining command execution leveraging SQL Injection?
  14. Describe Cross Site Request Forgery.
    a. How would you prevent it?
  15. Describe the different types of Cross Site Scripting.
  16. Describe how and where in an application you might test for username enumeration.
  17. Briefly, what is the purpose of the same origin policy with relation to the document object model?
  18. Are there any security concerns with scoping an authorization cookie to the parent domain?
  19. Describe the basics of input and output of a block cipher.
  20. Describe the basics of input and output of a stream cipher.
  21. List a couple block ciphers and their characteristics and security concerns.
  22. Describe when you would use a null byte during an application penetration test.
  23. What is the problem with LM hashes?
    [According to Justin, "When asking #23 you have to make sure to do it in a Jerry Seinfeld "What's the deal with airplane food?" voice"]
  24. What is the difference between netNTLM and NTLM hashes?
  25. Suppose you have physical access to a machine on a corporate domain that you are testing. It is connected to their network. You don't have credentials for the domain or local machine. You also have your own laptop. How would you begin testing?
  26. What is pass the hash?
  27. What is token impersonation?
  28. What tests you would perform in the following scenarios: suppose you are assessing an application, the “forgot password” process consists of 3 steps:
    a. Enter your username
    b. Answer 3 security questions
    c. Set a new password
  29. You are performing an application penetration test and you come across a Java applet, describe what you might do with it.
  30. What would you inject into an HTML page of a victim to get their Windows computer to send you their password hashes?
  31. What is the relevance of WPAD on a penetration test and how can it be leveraged?
  32. What methods or sources of information do you use for keeping up to date in the security industry?
  33. Answer true or false and explain your answer: two-factor authentication protects against session hijacking.
  34. Do you participate in the information security community in any way?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.