Filter interviews by
SSRF stands for Server-Side Request Forgery, a vulnerability that allows attackers to send crafted requests from the server.
SSRF is a type of vulnerability where an attacker can make the server send requests to other resources on the internet.
Attackers can exploit SSRF to access internal systems, bypass firewalls, and perform reconnaissance on the network.
Mitigations for SSRF include input validation, whitelisting of a...
IDOR stands for Insecure Direct Object References, a security vulnerability where an attacker can access unauthorized data by manipulating object references.
IDOR occurs when an application exposes internal implementation objects to users without proper authorization checks.
Attackers can exploit IDOR by manipulating object references in URLs or parameters to access sensitive data.
Preventing IDOR involves implementing pr...
Direct path traversal is a type of attack where an attacker accesses files or directories that are not intended to be accessed.
Direct path traversal involves manipulating the file path in a URL to access restricted files or directories.
It can be used to bypass security measures and gain unauthorized access to sensitive information.
For example, if a website allows users to download files by specifying the file path in t...
Top trending discussions
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
I applied via Naukri.com and was interviewed in Jul 2022. There were 4 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There was 1 interview round.
I applied via Referral and was interviewed before Mar 2023. There were 3 interview rounds.
Basic aptitude test at a moderate level
Understand the coding proficiency of the candidate
I applied via campus placement at Uttar Pradesh Technical University (UPTU) and was interviewed in Aug 2021. There were 3 interview rounds.
A virus is a self-replicating program that spreads by infecting other programs, while a Trojan is a program that appears harmless but actually has malicious intent.
Viruses attach themselves to clean files and spread when the infected file is executed.
Trojans are often disguised as legitimate software and trick users into installing them.
Viruses can cause damage to files and systems, while Trojans can steal data or give...
based on 8 reviews
Rating in categories
Security Consultant
43
salaries
| ₹1.5 L/yr - ₹10.1 L/yr |
Associate Security Consultant
42
salaries
| ₹3 L/yr - ₹10 L/yr |
Security Analyst
12
salaries
| ₹3.5 L/yr - ₹11.9 L/yr |
Senior Security Consultant
9
salaries
| ₹8.5 L/yr - ₹20 L/yr |
Soc Analyst 1
7
salaries
| ₹5.5 L/yr - ₹9.2 L/yr |
Paladion Networks
Kratikal Tech Private Limited
Safe Security
TCS