Filter interviews by
IDOR stands for Insecure Direct Object References, a security vulnerability where an attacker can access unauthorized data by manipulating object references.
IDOR occurs when an application exposes internal implementation objects to users without proper authorization checks.
Attackers can exploit IDOR by manipulating object references in URLs or parameters to access sensitive data.
Preventing IDOR involves implementing pr...
Direct path traversal is a type of attack where an attacker accesses files or directories that are not intended to be accessed.
Direct path traversal involves manipulating the file path in a URL to access restricted files or directories.
It can be used to bypass security measures and gain unauthorized access to sensitive information.
For example, if a website allows users to download files by specifying the file path in t...
SSRF stands for Server-Side Request Forgery, a vulnerability that allows attackers to send crafted requests from the server.
SSRF is a type of vulnerability where an attacker can make the server send requests to other resources on the internet.
Attackers can exploit SSRF to access internal systems, bypass firewalls, and perform reconnaissance on the network.
Mitigations for SSRF include input validation, whitelisting of a...
Top trending discussions
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
posted on 22 Aug 2022
I applied via Campus Placement and was interviewed in Jul 2022. There were 4 interview rounds.
OS, DBMS, DLD, Networking, and Cryptography
Cryptography is the practice of secure communication in the presence of third parties. There are two types: symmetric and asymmetric.
Symmetric cryptography uses the same key for encryption and decryption, such as AES and DES.
Asymmetric cryptography uses a public key for encryption and a private key for decryption, such as RSA and ECC.
Other types include hashing algorithms like SHA-256 and digital signatures like DSA.
Cr...
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
I applied via Naukri.com and was interviewed in Jul 2022. There were 4 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There was 1 interview round.
I applied via Referral and was interviewed before Mar 2023. There were 3 interview rounds.
Basic aptitude test at a moderate level
Understand the coding proficiency of the candidate
Interview experience
based on 8 reviews
Rating in categories
Associate Security Consultant
47
salaries
| ₹3 L/yr - ₹10 L/yr |
Security Consultant
45
salaries
| ₹1.5 L/yr - ₹10 L/yr |
Security Analyst
12
salaries
| ₹3.5 L/yr - ₹11.9 L/yr |
Senior Security Consultant
9
salaries
| ₹8.5 L/yr - ₹20 L/yr |
Soc Analyst 1
7
salaries
| ₹5.5 L/yr - ₹9.2 L/yr |
Paladion Networks
Kratikal Tech Private Limited
Safe Security
TCS