Filter interviews by
I applied via LinkedIn and was interviewed before Nov 2023. There were 2 interview rounds.
Different attacks have unique characteristics and targets, such as CSRF/SSRF, LFI/RFI, Stored XSS/DOM based XSS.
CSRF (Cross-Site Request Forgery) - attacker tricks a user into performing actions on a website without their knowledge
SSRF (Server-Side Request Forgery) - attacker can make the server perform requests to other servers
LFI (Local File Inclusion) - attacker can include files on a server through a web browser
RFI...
Privilege escalation can be achieved by exploiting vulnerabilities in the system or using social engineering techniques.
Exploit vulnerabilities in the system to gain higher privileges
Use social engineering techniques to trick users into granting higher privileges
Utilize known privilege escalation techniques such as DLL hijacking or abusing misconfigured permissions
Cross-Site Scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Reflected XSS: occurs when the malicious script is reflected off a web server, such as in search results or error messages
Stored XSS: the injected script is permanently stored on the target server, such as in a comment section or database
DOM-based XSS: the attack occurs i...
Common ports for network communication
Port 80 - HTTP (Hypertext Transfer Protocol)
Port 443 - HTTPS (Hypertext Transfer Protocol Secure)
Port 25 - SMTP (Simple Mail Transfer Protocol)
Port 22 - SSH (Secure Shell)
Port 21 - FTP (File Transfer Protocol)
Bruteforce is a method used to crack passwords by systematically trying all possible combinations until the correct one is found.
Use automated tools like Hydra or Burp Suite to try different combinations of usernames and passwords
Start with common passwords and then move on to more complex ones
Bruteforcing can be time-consuming and may trigger account lockouts if not done carefully
Burp Suite is a web vulnerability scanner and proxy tool, while Nessus is a vulnerability assessment tool.
Burp Suite is used for web application security testing, including scanning for vulnerabilities and intercepting and modifying HTTP traffic.
Nessus is used for network vulnerability scanning and assessment, identifying security issues in systems and applications.
Both tools are essential for identifying and addressin...
Repeater in Burp Suite is used to manually modify and re-send individual HTTP requests.
Repeater tool allows for manual editing of requests before sending them again
Useful for testing different parameters or payloads
Helps in analyzing server responses to modified requests
We follow a systematic approach for performing VAPT on web applications, mobile applications, and network infra with the provided URL/IP address.
First, conduct a thorough reconnaissance phase to gather information about the target.
Next, perform vulnerability scanning to identify potential security weaknesses.
Then, conduct penetration testing to exploit the identified vulnerabilities.
Finally, provide a detailed report w...
Top trending discussions
posted on 24 Nov 2021
I applied via Recruitment Consultant and was interviewed before Nov 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Walk-in and was interviewed in May 2020. There were 4 interview rounds.
I applied via Referral and was interviewed in Nov 2019. There were 3 interview rounds.
A Security Analyst is responsible for testing web applications, identifying vulnerabilities, and implementing security measures to protect against attacks.
Testing a web application involves various techniques such as penetration testing, vulnerability scanning, and code review.
CSRF (Cross-Site Request Forgery) is an attack that tricks a victim into performing unwanted actions on a web application.
SSRF (Server-Side Requ...
The transaction code (tcode) for user creation in SAP is SU01.
The tcode SU01 is used to create, modify, and display user master records in SAP.
It is commonly used by SAP Security Consultants to manage user accounts and authorizations.
To access the SU01 transaction, you can either enter it directly in the command field or navigate through the SAP menu path: Tools -> Administration -> User Maintenance -> Users.
Once in th...
I applied via Campus Placement and was interviewed before Sep 2021. There were 3 interview rounds.
A C program for designing calculator
Use switch case for different operations
Use scanf to take input from user
Use printf to display output
Use functions for each operation
Use loops for continuous calculations
I applied via Campus Placement and was interviewed before Nov 2021. There were 3 interview rounds.
It was abasic MBA leven quat and reasoning questions
I applied via Naukri.com and was interviewed in Apr 2021. There was 1 interview round.
Security testing should be performed at every stage of SDLC to ensure a secure product.
Security requirements should be defined at the planning stage
Threat modeling should be done during the design phase
Code review and vulnerability scanning should be done during the development phase
Penetration testing and security acceptance testing should be done during the testing phase
Security monitoring and incident response plann...
OWASP top 10 is a list of common web application vulnerabilities. Mitigation involves implementing security controls to prevent or reduce the impact of these vulnerabilities.
Injection attacks can be mitigated by input validation and parameterized queries
Cross-site scripting (XSS) can be mitigated by input validation and output encoding
Broken authentication and session management can be mitigated by implementing strong ...
Some of the top questions asked at the Global IS Consulting Cyber Security Analyst Lead interview for experienced candidates -
based on 1 interview
Interview experience
based on 1 review
Rating in categories
TCS
Accenture
Wipro
Cognizant