Skip to content

kh4sh3i/Penetration-Testing-Interview-Questions

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Penetration Testing Interview Questions

Penetration Testing Interview Questions

General

  • What are the phases in the penetration testing lifecycle? (recon,scan,..)
  • What types of penetration testing assessments are there? (Internal/External Infrastructure Penetration Testing / Wireless/Web/mobile)
  • Difference between active and passive reconnaissance ?
  • How are penetration tests classified?
  • What types of penetration testing teams are there and what are their responsibilities?
  • What are some of the types of attackers? (Script kiddie/ APT/ Malicious insider)
  • What are the most common types of malware?
  • What are some of the most common vulnerability databases? (NVD/CVE/exploit db/packetstorm/vulnhub)
  • What is the Common Vulnerability Scoring System?
  • How would you rate vulnerabilities during a penetration test? (risk matrix)
  • At what point of an assessment would you start performing testing?
  • What are some of the most common vulnerabilities?
  • What is the principle of least privilege?

Infrastructure/Operating Systems

  • What is the OSI model and what are its layers?
  • What is the difference between TCP and UDP?
  • What are some of the most common services and what ports do they run on?
  • What is DNS?
  • What is ARP?
  • What is RDP?
  • What is a MAC address?
  • What is a firewall and how does it work?
  • What is the difference between an IDS and an IPS?
  • What are honeypots?
  • What is the difference between encoding, hashing and encrypting?
  • Name a few type of encoding, hash and encryption
  • What is salting and what is it used for
  • What is the fastest way to crack hashes?
  • Difference between symmetric and asymmetric encryption
  • In what format are Windows and Linux hashes stored
  • Where are Windows and Linux hashes stored, how can you retrieve them?
  • What are cron jobs/scheduled tasks?
  • Where are cron jobs stored in Windows and Linux?
  • What are the different package managers used in Linux and where are they used?
  • Describe the permission system used in Linux file systems
  • What are SUID and sudo?
  • What is Kerberos and how does it perform authentication?
  • What is the difference between WEP, WPA and WPA2
  • What is WPS? Why is it insecure?

Common Techniques & Attacks

  • How can DNS and ARP be exploited by attackers?
  • What is DDoS?
  • What is buffer overflow?
  • What is packet inspection?
  • What is privilege escalation? Provide a few examples
  • What is the difference between bruteforce and dictionary attacks?
  • What is a golden ticket attack?
  • What is a common misconfiguration of FTP and SMB? (anonymous login/ null session)

Web Application Vulnerabilities & Attacks

  • what is XSS, what types of XSS are there, what are the consequences of a successful attack and how do you prevent XSS?
  • What is SQL Injection, different types and examples, how to prevent ?
  • Secure and HTTPOnly flags
  • What is CSRF, what does it entail and how can it be prevented?
  • What is IDOR, what are its consequences and how can you prevent it?
  • What are LFI and RFI and what are the consequences of these attacks? How can they be prevented?
  • How can you secure data in transit?

Penetration Testing Tools

  • What tool would you use to perform a port scan?
  • What tools would you use to inspect network packets?
  • What tool would you use to bruteforce passwords, online and offline?
  • What tool would you use to automate SQL injection attacks?
  • What tool would you use to perform an ARP spoofing attack? (Ettercap)
  • What tools would you use to perform testing against WiFi networks
  • What tool can help generate malicious executables?
  • What tools would you use to scan a network for known vulnerabilities?
  • What tool would you use to inspect the route between a host and a destination?

Scenario-Based

  • How would you remotely access a service that can only be accessed from within an internal network?
  • How would you allow regular users to run bash scripts as root and which way is most secure? (cron jobs)
  • If you were able to obtain an NTLM hash but could not decrypt it, how would you use this knowledge to obtain access to the target host? (pHT)
  • What measures would you put in place to prevent brute forcing?

refrences