Global IS Consulting
Thirdware Solutions Interview Questions and Answers
Q1. what approach we follow to preform vapt on web applications, mobile applications, and network infra. If we have the url/ip address?
We follow a systematic approach for performing VAPT on web applications, mobile applications, and network infra with the provided URL/IP address.
First, conduct a thorough reconnaissance phase to gather information about the target.
Next, perform vulnerability scanning to identify potential security weaknesses.
Then, conduct penetration testing to exploit the identified vulnerabilities.
Finally, provide a detailed report with recommendations for remediation.
Examples: Using tools ...read more
Q2. how to preform privilege escalation if we have normal user access?
Privilege escalation can be achieved by exploiting vulnerabilities in the system or using social engineering techniques.
Exploit vulnerabilities in the system to gain higher privileges
Use social engineering techniques to trick users into granting higher privileges
Utilize known privilege escalation techniques such as DLL hijacking or abusing misconfigured permissions
Q3. differentiate between different attacks (like; CSRF/SSRF, LFI/RFI Stored XSS/DOM based XSS, etc.)
Different attacks have unique characteristics and targets, such as CSRF/SSRF, LFI/RFI, Stored XSS/DOM based XSS.
CSRF (Cross-Site Request Forgery) - attacker tricks a user into performing actions on a website without their knowledge
SSRF (Server-Side Request Forgery) - attacker can make the server perform requests to other servers
LFI (Local File Inclusion) - attacker can include files on a server through a web browser
RFI (Remote File Inclusion) - attacker can include files from...read more
Q4. how to use burpsuite, and nessus
Burp Suite is a web vulnerability scanner and proxy tool, while Nessus is a vulnerability assessment tool.
Burp Suite is used for web application security testing, including scanning for vulnerabilities and intercepting and modifying HTTP traffic.
Nessus is used for network vulnerability scanning and assessment, identifying security issues in systems and applications.
Both tools are essential for identifying and addressing security vulnerabilities in networks and web application...read more
Q5. list of common ports for network communication
Common ports for network communication
Port 80 - HTTP (Hypertext Transfer Protocol)
Port 443 - HTTPS (Hypertext Transfer Protocol Secure)
Port 25 - SMTP (Simple Mail Transfer Protocol)
Port 22 - SSH (Secure Shell)
Port 21 - FTP (File Transfer Protocol)
Q6. how to preform bruteforce
Bruteforce is a method used to crack passwords by systematically trying all possible combinations until the correct one is found.
Use automated tools like Hydra or Burp Suite to try different combinations of usernames and passwords
Start with common passwords and then move on to more complex ones
Bruteforcing can be time-consuming and may trigger account lockouts if not done carefully
Q7. different types of xss, explain
Cross-Site Scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Reflected XSS: occurs when the malicious script is reflected off a web server, such as in search results or error messages
Stored XSS: the injected script is permanently stored on the target server, such as in a comment section or database
DOM-based XSS: the attack occurs in the Document Object Model (DOM) rather than the server-s...read more
Q8. use repeater in burpsuite
Repeater in Burp Suite is used to manually modify and re-send individual HTTP requests.
Repeater tool allows for manual editing of requests before sending them again
Useful for testing different parameters or payloads
Helps in analyzing server responses to modified requests
Reviews
Interviews
Salaries
Users/Month