Filter interviews by
Privilege escalation can be achieved by exploiting vulnerabilities in the system or using social engineering techniques.
Exploit vulnerabilities in the system to gain higher privileges
Use social engineering techniques to trick users into granting higher privileges
Utilize known privilege escalation techniques such as DLL hijacking or abusing misconfigured permissions
Repeater in Burp Suite is used to manually modify and re-send individual HTTP requests.
Repeater tool allows for manual editing of requests before sending them again
Useful for testing different parameters or payloads
Helps in analyzing server responses to modified requests
Bruteforce is a method used to crack passwords by systematically trying all possible combinations until the correct one is found.
Use automated tools like Hydra or Burp Suite to try different combinations of usernames and passwords
Start with common passwords and then move on to more complex ones
Bruteforcing can be time-consuming and may trigger account lockouts if not done carefully
Cross-Site Scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Reflected XSS: occurs when the malicious script is reflected off a web server, such as in search results or error messages
Stored XSS: the injected script is permanently stored on the target server, such as in a comment section or database
DOM-based XSS: the attack occ...
We follow a systematic approach for performing VAPT on web applications, mobile applications, and network infra with the provided URL/IP address.
First, conduct a thorough reconnaissance phase to gather information about the target.
Next, perform vulnerability scanning to identify potential security weaknesses.
Then, conduct penetration testing to exploit the identified vulnerabilities.
Finally, provide a detailed rep...
OWASP Top 10 identifies the most critical web application security risks to help organizations improve their security posture.
Provides a framework for understanding common vulnerabilities like SQL Injection and Cross-Site Scripting (XSS).
Helps prioritize security efforts by focusing on the most prevalent and impactful risks.
Facilitates communication between technical and non-technical stakeholders regarding securi...
Different attacks have unique characteristics and targets, such as CSRF/SSRF, LFI/RFI, Stored XSS/DOM based XSS.
CSRF (Cross-Site Request Forgery) - attacker tricks a user into performing actions on a website without their knowledge
SSRF (Server-Side Request Forgery) - attacker can make the server perform requests to other servers
LFI (Local File Inclusion) - attacker can include files on a server through a web brows...
Common ports for network communication
Port 80 - HTTP (Hypertext Transfer Protocol)
Port 443 - HTTPS (Hypertext Transfer Protocol Secure)
Port 25 - SMTP (Simple Mail Transfer Protocol)
Port 22 - SSH (Secure Shell)
Port 21 - FTP (File Transfer Protocol)
I applied via LinkedIn and was interviewed before Nov 2023. There were 2 interview rounds.
OWASP Top 10 identifies the most critical web application security risks to help organizations improve their security posture.
Provides a framework for understanding common vulnerabilities like SQL Injection and Cross-Site Scripting (XSS).
Helps prioritize security efforts by focusing on the most prevalent and impactful risks.
Facilitates communication between technical and non-technical stakeholders regarding security is...
Different attacks have unique characteristics and targets, such as CSRF/SSRF, LFI/RFI, Stored XSS/DOM based XSS.
CSRF (Cross-Site Request Forgery) - attacker tricks a user into performing actions on a website without their knowledge
SSRF (Server-Side Request Forgery) - attacker can make the server perform requests to other servers
LFI (Local File Inclusion) - attacker can include files on a server through a web browser
RFI...
Privilege escalation can be achieved by exploiting vulnerabilities in the system or using social engineering techniques.
Exploit vulnerabilities in the system to gain higher privileges
Use social engineering techniques to trick users into granting higher privileges
Utilize known privilege escalation techniques such as DLL hijacking or abusing misconfigured permissions
Cross-Site Scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Reflected XSS: occurs when the malicious script is reflected off a web server, such as in search results or error messages
Stored XSS: the injected script is permanently stored on the target server, such as in a comment section or database
DOM-based XSS: the attack occurs i...
Common ports for network communication
Port 80 - HTTP (Hypertext Transfer Protocol)
Port 443 - HTTPS (Hypertext Transfer Protocol Secure)
Port 25 - SMTP (Simple Mail Transfer Protocol)
Port 22 - SSH (Secure Shell)
Port 21 - FTP (File Transfer Protocol)
Bruteforce is a method used to crack passwords by systematically trying all possible combinations until the correct one is found.
Use automated tools like Hydra or Burp Suite to try different combinations of usernames and passwords
Start with common passwords and then move on to more complex ones
Bruteforcing can be time-consuming and may trigger account lockouts if not done carefully
Burp Suite is a web vulnerability scanner and proxy tool, while Nessus is a vulnerability assessment tool.
Burp Suite is used for web application security testing, including scanning for vulnerabilities and intercepting and modifying HTTP traffic.
Nessus is used for network vulnerability scanning and assessment, identifying security issues in systems and applications.
Both tools are essential for identifying and addressin...
Repeater in Burp Suite is used to manually modify and re-send individual HTTP requests.
Repeater tool allows for manual editing of requests before sending them again
Useful for testing different parameters or payloads
Helps in analyzing server responses to modified requests
We follow a systematic approach for performing VAPT on web applications, mobile applications, and network infra with the provided URL/IP address.
First, conduct a thorough reconnaissance phase to gather information about the target.
Next, perform vulnerability scanning to identify potential security weaknesses.
Then, conduct penetration testing to exploit the identified vulnerabilities.
Finally, provide a detailed report w...
Top trending discussions
I appeared for an interview before Jul 2021.
I applied via Walk-in and was interviewed before May 2020. There were 3 interview rounds.
I applied via Naukri.com
Amazon's innovation, customer focus, and diverse opportunities align with my career goals and values.
Customer Obsession: Amazon prioritizes customer satisfaction, evident in initiatives like Prime and personalized recommendations.
Innovation: The company is a leader in technology and logistics, constantly pushing boundaries with services like AWS and drone delivery.
Diversity of Roles: Amazon offers a wide range of caree...
I expect Amazon to foster innovation, provide growth opportunities, and maintain a customer-centric culture.
Opportunities for professional development, such as training programs and mentorship.
A collaborative work environment that encourages teamwork and idea sharing.
Access to cutting-edge technology and resources to drive innovation.
A strong focus on customer satisfaction, ensuring that every decision prioritizes the ...
I applied via Naukri.com and was interviewed before Feb 2020. There were 3 interview rounds.
Workflow, trigger, reports, roles, profiles, permission set, and sharing rules are all important features in Salesforce.
Workflow is a series of automated steps that can be used to streamline business processes.
Triggers are used to execute code before or after a record is inserted, updated, or deleted.
Reports are used to display data in a visual format, such as a table or chart.
Roles are used to define the hierarchy of ...
I appeared for an interview before Jul 2020.
Yes, Infosys is listed on the Indian stock exchanges as well as on the NYSE.
Infosys is listed on the Bombay Stock Exchange (BSE) and National Stock Exchange of India (NSE)
It is also listed on the New York Stock Exchange (NYSE)
Infosys has a market capitalization of over $80 billion as of 2021
I applied via Job Fair and was interviewed before Feb 2021. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Nov 2019. There were 3 interview rounds.
I'm seeking new challenges and opportunities for growth that align with my career goals and aspirations.
Desire for professional growth: I'm looking to expand my skill set and take on more leadership responsibilities.
Seeking a better cultural fit: My current company has a different work culture than what I thrive in; I value collaboration and innovation.
Interest in new technologies: I'm excited about working with cuttin...
I applied via Approached by Company and was interviewed before May 2018. There were 6 interview rounds.
I am a dedicated and hardworking individual with a passion for learning and growth.
I have a Bachelor's degree in Business Administration from XYZ University.
I have 3 years of experience working in marketing and sales roles.
I am proficient in Microsoft Office Suite and have strong communication skills.
I am a team player and enjoy collaborating with others to achieve common goals.
My career objectives focus on continuous growth, contributing to team success, and making a positive impact in my field.
Aim to develop expertise in my field, such as becoming a certified project manager.
Seek leadership opportunities to guide and mentor junior team members.
Aspire to work on innovative projects that challenge my skills and creativity.
Desire to contribute to a company's mission, like improving customer sa...
TCS is a global leader in IT services with a strong reputation for innovation and client satisfaction.
TCS has a proven track record of delivering high-quality services to clients worldwide.
TCS offers a wide range of opportunities for career growth and development.
TCS values diversity and inclusion, creating a supportive work environment for employees.
TCS invests in cutting-edge technologies and training programs to kee...
based on 1 interview experience
Difficulty level
Duration
based on 1 review
Rating in categories
TCS
Accenture
Wipro
Cognizant