- What type of security testing you performed?
- What types of web testing security problems do you know?
- Please classify vulnerabilities that you know.
- What are two common techniques used to protect a password file?
- What is integer overflow?
- What is your understanding of root causes of vulnerabilities?
- What is ISO 17799?
- Can you describe security defect prevention?
- List and briefly define three classes of intruders.
- What are three benefits that can be provided by an intrusion detection system?
- What services are provided by the SSL Record Protocol?
- Why do we need validate users input for length and characters?
- Why we need to keep track of individual users and authentication?
- What is runtime inspection?
- Describe with examples Fuzzers and Sniffers tools:
- Define buffer overflows.
- What are format string vulnerabilities?
- What is SQL injection?
- Provide example of command injection.
- Provide example of broken access control.
- List and briefly define the parameters that define an SSL session state.
- List and briefly define the parameters that define an SSL session connection.
- Why do we need port scanning?
- How to use an interactive proxy and a set of fuzz strings to manually test the application’s handling of data?
- What is cookie gathering?
- What is a honeypot?
- What is phishing attack?
- What is a dual signature and what is its purpose?
- How can you ensure that all input fields are properly validated to prevent code injection attacks?
- What tools can you use to validate the strength of SID (session ID)?
- What is file enumeration?
- What steps are involved in the SSL Record Protocol transmission?
- What are hidden fields in HTTP?
- What protocols comprise SSL?
- How to implement (create) a custom fuzz utility and test it against your application?
- Describe SOAP and WSDL.
- List and briefly define the principal categories of SET participants.
- How to test a scriptable ActiveX object?
- What is the difference between statistical anomaly detection and rule-based intrusion detection?
- What metrics are useful for profile-based intrusion detection?
- What is the difference between rule-based anomaly detection and rule-based penetration identification?
- What is a salt in the context of UNIX password management?
- List and briefly define four techniques used to avoid guessable passwords.
- What is the difference between an SSL connection and an SSL session?
- List and briefly define Acronyms and Abbreviations Related to Software security
- Write an example of misusing strcpy() in C and C++ in such a way that a buffer overflow condition exists as a bug
- Why we use firewall for security when we have facilities like access-list on routers ?
- What are the most important steps you would recommend for securing a new web server? Web application?
- You have been asked to review the source code for a compiled script that is being used to validate logon credentials for a web application. The file is called "logon_validate" and a typical logon request looks like this -
- If you were not using Apache as the reverse proxy, what Microsoft application/tool could you use to mitigate this attack?
- What do you see as challenges to successfully deploying/monitoring web intrusion detection?
- What online resources do you use to keep abreast of web security issues? Can you give an example of a recent web security vulnerability or threat?
- What does this log entry indicate? How could you identify what the contents are of the "hacked.htm" file that the attacker is trying to upload?
- What are some examples of you how you would attempt to gain access?
- What application generated the log file entry below? What type of attack is this? Assuming the index.php program is vulnerable, was this attack successful?
- One of your web servers is logging multiple requests similar to the following:
- What is your definition of the term "Cross-Site Scripting"? What is the potential impact to servers and clients?
- What do you see as the most critical and current threats effecting Internet accessible websites?
- What is a firewall?
- Describe how to manage a firewall
- What is a Denial of Service attack?
- What is a “spoofed” packet?
- What is a SYN Flood?
- What do you do if you are a victim of a DoS?
- What is GPG/PGP?
- What is SSH?
- What is SSL? How do you create certificates?
- What would you do if you discovered a UNIX or Network device on your network has been compromised?
- What would you do if you discovered a Windows system on your network has been comrpromised?
- What is DNS Hijacking?
- What is a log host?
- What is IDS or IDP, and can you give me an example of one?
- Why are proxy servers useful?
- What is web-caching?
What are the most important steps you would recommend for securing a new web server?
The following are the most important steps for securing a new web server:
1. Update/patch the web server software
2. Ensure that the server functionality is minimized and disable the extra modules
3. Always remove the fault scripts / data
4. Increase the verboseness of logging
5. Update the ownership / permissions of the files.
What are the most important steps you would recommend for securing a new web server?
- Minimize rights.
- Update permissions.
- Delete default data and scripts.
- Make use of software firewall.
- Enable and make use of IIS logging.
- Regular backup.
- Updating the windows tool installed.
A web application or webapp is an application that is accessed via web browser over a network such as the Internet or an intranet. Application security deals with checking the vulnerabilities in application and to ensure there is secure methods followed to remove these security flaws at all stages of SDLC
Wednesday, 9 March 2011
Security/Penetration Testing Interview Questions
Subscribe to:
Post Comments (Atom)
Good ones,
ReplyDeleteMany thanks for sharing it.
Reg
Kiran
Thanks allot !!!
ReplyDeletewell shared...
ReplyDeleteThanks :)
It's highly appreciable if you update your blog... :) :) :)
very helpful
ReplyDeletethanks
Good work.
ReplyDelete