i
Aftershoot
Filter interviews by
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
Top trending discussions
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
posted on 12 Jul 2024
I applied via LinkedIn and was interviewed in Oct 2024. There was 1 interview round.
Sorting algorithms,many real time scenario questions
I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 2 interview rounds.
posted on 7 Oct 2024
I would like to work in this company because of its strong reputation, innovative products, and opportunities for growth.
I am impressed by the company's reputation in the industry and its commitment to excellence.
I am excited about the opportunity to work with innovative products and contribute to their success.
I see great potential for growth and advancement within the company, which aligns with my career goals.
I applied via LinkedIn
Basic content assignment
posted on 22 Apr 2024
The methodology approach for API and web pen test involves identifying vulnerabilities, testing for exploits, and reporting findings.
Identify the scope of the test and the target systems
Perform reconnaissance to gather information about the target
Test for common vulnerabilities such as SQL injection and cross-site scripting
Test for exploits to determine the impact of vulnerabilities
Report findings and provide recommend
CSRF tokens are used to prevent unauthorized access to sensitive data or actions on a website.
CSRF tokens add an extra layer of security to web applications by ensuring that requests are coming from an authenticated user.
They are generated by the server and included in forms or URLs to verify the authenticity of the request.
Without CSRF tokens, attackers can use cross-site scripting (XSS) attacks to trick users into un...
OWASP vulnerabilities commonly encountered in security analysis
Injection flaws (SQL, LDAP, OS command, etc.)
Cross-site scripting (XSS)
Broken authentication and session management
Security misconfiguration
Sensitive data exposure
Insufficient logging and monitoring
Using components with known vulnerabilities
Insecure communication (e.g. lack of encryption)
Broken access control
XML External Entities (XXE)
based on 4 reviews
Rating in categories
Associate Product Manager
9
salaries
| ₹8.5 L/yr - ₹14 L/yr |
Product Designer
9
salaries
| ₹10 L/yr - ₹15 L/yr |
ml engineer
5
salaries
| ₹14 L/yr - ₹24 L/yr |
WedMeGood
ShaadiSaga
Urban Company
BookMyShow