Q1. Describe your process for conducting a web application penetration test, from initial reconnaissance to reporting.
Why you'll be asked this: This question assesses your understanding of the full web app pen testing lifecycle, your methodology, and your proficiency with relevant tools and frameworks like OWASP Top 10.
Start with reconnaissance (e.g., sub-domain enumeration, technology stack identification using tools like Nmap, Shodan, Wappalyzer). Move to mapping the application (Burp Suite proxying, spidering). Detail vulnerability identification (OWASP Top 10, common flaws like XSS, SQLi, CSRF, broken access control), explaining specific tools (Burp Suite Scanner, manual testing). Discuss exploitation techniques and post-exploitation. Conclude with reporting, emphasizing clear communication of findings, impact, and remediation.
- Only listing tools without explaining *how* they're used in context.
- Missing key phases like reconnaissance or reporting.
- Focusing solely on automated scanning without manual verification or exploitation.
- Lack of mention of OWASP Top 10 or other relevant standards.
- How do you handle rate limiting or WAFs during a web app test?
- Can you give an example of a complex web vulnerability you've exploited and how you did it?
- What's your approach to testing APIs specifically?