thedudeabides wrote: » Had my first interview in a long time, and it was a phone interview, which I've never been good at (I do better in person). I froze up on so many obvious questions because of anxiety and lack of confidence. Just to give one example, she asked what I would do during a webapp pentest if I'm at a login webpage. In my brain, I was thinking "first thing is I'd look at the page source, see if there are any obvious vulnerabilities in the code, then check for input validation, perhaps try common login/password combos ...is that allowed? I don't know if that's allowed...better not say that. I'm not sure", but all I said to her was "uhhh...I don't know." It was pretty sad on my part. Most of the questions went that way. Of course friends were like, "ehhh...I'm sure you did fine." Nope...I really didn't. Got the rejection email today. Kind of a shame because I think that job would have been a good fit : .
johndoee wrote: » A good fit although you didn't do well on the interview? You lost me at your last sentence. I feel that people in general have to understand what they are applying for. If in the job description it states a tool or emphasis on web applications, research has to be done...even out of the scope of the job description. An individual has to understand the scope of the job and an idea of the tools. The idea is to understand your scope. Which wasn't properly laid out. But, the first thing anybody would do under normal circumstances is try not minimize or eliminate the generation of logs. That is personally what I would do. Which is what trying a combination of what you call "common" login/passwords will generate. More security device, I mean all security devices and correlation mechanism will generate logs, especially for incorrect login attempts. That is like knocking on a door and expecting them not to see you out of the peep hole. You said you said uhhh I don't know. I feel that in a help desk interview that would be a turn off. At Level 1 Help Desk saying uhhh... I don't know is not the right answer. That basically says that you aren't able to articulate yourself. You have to work on your communications skills. I suggest you work on YOUR interviewing skills. That seems the be one of my best solutions. From a phone interview, people can dial into the interview from a phone number at the comfort of a desk. Someone can be at work and do the interview. Someone can be in Thailand and do the interview. I remember I did a phone interview with HP and the manger worked remote and wasn't even at the office. So, I feel that in order to not waste a single persons time..a phone interview should be done first! If I was at home with my wife working remote and had to come into an interview an you said uhhhh...I don't know some could see that as a waste of time. Some things are automatically a turn off depending on the interviewer.
thedudeabides wrote: » she asked what I would do during a webapp pentest if I'm at a login webpage.
Sheiko37 wrote: » It's a weird question, because in real life what you'd do is just log in with the supplied credentials and start testing the application.
Sheiko37 wrote: » I'd email the client saying they haven't forwarded the credentials, then go get a coffee.
mgeoffriau wrote: » What? It sounds like they're asking "How would you test a login page for vulnerabilities?"
tedjames wrote: » That's my point. Essentially, what happens if you hit a roadblock?
tedjames wrote: » That's my point. Essentially, what happens if you hit a roadblock? Do you give up or do you try to find another way in? A hacker would see a login page as a challenge. How can I get in? Can I brute force my way in? I would do some reconnaissance and try to find their default account username structure. A little Google Dorking goes a long way. They also could still be using default credentials, like admin/admin. If I were interviewing someone for a penetration testing job, this is the kind of thing I'd want to hear.
tedjames wrote: » Write all of this stuff down and keep it handy for next time you do a phone interview. We interviewed someone via Skype (out of state) and paid attention to where his eyes went when we asked questions.
Syntax wrote: » I think maybe what they were saying is the easiest and first thing an effective hacker would do is ask someone nicely for the credentials. Then the rest of that stuff doesn't matter, you've broken in.
tedjames wrote: » That's my point. Essentially, what happens if you hit a roadblock? Do you give up or do you try to find another way in? A hacker would see a login page as a challenge. How can I get in? Can I brute force my way in?