-
Notifications
You must be signed in to change notification settings - Fork 9
/
Copy pathsecurity-interview-questions
97 lines (91 loc) · 4.76 KB
/
security-interview-questions
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
Encryption and Authentication
* What is a three-way handshake?
* How do cookies work?
* How do sessions work?
* Explain how OAuth works.
* What is a public key infrastructure flow and how would I diagram it?
* Describe the difference between synchronous and asynchronous encryption.
* Describe SSL handshake.
* How does HMAC work?
* Why HMAC is designed in that way?
* What is the difference between authentication vs authorization name spaces?
* What’s the difference between Diffie-Hellman and RSA?
* How does Kerberos work?
* If you're going to compress and encrypt a file, which do you do first and why?
* What is the difference between encryption and encoding?
* What is the difference between 128 and 256?
* How do I authenticate you and know you sent the message?
* Should you encrypt all data at rest?
Network Level
* What are common ports involving security, what are the risks and mitigations?
* Which one for DNS?
* AH
* ESP
* Describe HTTPs and how it is used.
* What is the difference between HTTPS and SSL?
* How does threat modeling work?
* What is a subnet and how is it useful in security?
* What is subnet mask?
* Explain what traceroute is.
* Draw a network, then expect them to raise an issue and have to figure out where it happened.
* Write out a Cisco ASA firewall configuration on the white board to allow three networks unfiltered access, 12 networks limited access to different resources on different networks, and 8 networks to be blocked altogether.
* Explain TCP/IP concepts.
* What is OSI model?
* How does a router differ from a switch?
* Describe the Risk Management Framework process and a project where you successfully implemented compliance with RMF.
* How does a packet travel between two hosts connected in same network?
* Explain the difference between TCP and UDP.
* Which is more secure?
* Why?
* What is the TCP three way handshake?
* What is the difference between IPSEC Phase 1 and Phase 2?
* What are biggest AWS security vulnerabilities?
* How do web certificates for HTTPS work?
* What is the purpose of TLS?
* Is ARP UDP or TCP?
* Explain what information is added to a packet at each stop of the 7 layer OSI model.
* Walk through a whiteboard scenario for your environment of choice (Win/Linux) in which compromising the network is the goal without use of social engineering techniques (phishing for credential harvesting, etc).
* Explain how you would build a web site that could secure communications between a client and a server and allow an authorized user to read the communications securely.
* How does an active directory work?
* Do you know how Single Sign-On works?
* What is a firewall?
* How does it work?
* How does it work in cloud computing?
* Difference between IPS and IDS?
* How do you build a tool to protect the entire Apple infra?
* How do you harden a system?
* How to you elevate permissions?
OWASP Top 10
* Differentiate XSS from CSRF.
* What do you do if a user brings you a pc that is acting 'weird'? You suspect malware.
* What is the difference between tcp dump and FWmonitor
* Do you know what XXE is?
* Explain man-in-the-middle attacks
Databases
* How would you secure a Mongo database?
* Postgres?
* Our DB was stolen/exfiltrated. It was secured with one round of sha256 with a static salt.
* What do we do now?
* Are we at risk?
* What do we change?
* What are the 6 aggregate functions of SQL?
Tools and Games
* Have I played CTF?
* How would you decrypt a steganography image?
* You're given an ip-based phone and asked me to decrypt the message in the phone.
* What CND tools do you knowledge or experience with?
* What is the difference between nmap -ss and nmap -st?
* How would you filter xyz in Wireshark?
* Given a sample packet capture - Identify the protocol, the traffic, and the likelihood of malicious intent.
* If left alone in office with access to a computer, how would you exploit it?
* How do you fingerprint an iPhone like Uber did so you can monitor it even after wiping it?
Programming
* Code review a project and look for the vulnerability.
* How would you conduct a security code review?
* How can Github webhooks be used in a malicious way?
* If I hand you a repo of source code to security audit what’s the first few things you would do?
* Can I write a tool that would search our Github repos for secrets, keys, etc.?
* Slack?
* https://arstechnica.com/security/2016/04/hacking-slack-accounts-as-easy-as-searching-github/
* AWS?
* Etc.