Skip to content

Instantly share code, notes, and snippets.

[Learning Exploit Development from fuzzysecurity.com]
Tools Needed:-
> Immunity debugger
> Mona.py
> Pvefindaddr.py
> Metasploit
> Virtual Box
Overflows to play with:-
1. Buffer overflow - A memory location receives more data than it was meant to
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Source from Peerlyst blog - https://www.peerlyst.com/posts/cracking-the-infosec-interview-for-fun-and-profit-how-not-to-suck-and-get-usdusd-hired-usdusd-fabio-baroni?trk=search_page_search_result
**********************************************************************
How do you change your DNS settings in Linux/Windows?
What’s the difference between encoding, encryption, and hashing?
> The purpose of ENCODING is to transform data so that it can be properly (and safely) consumed by a different type of system, e.g. binary data being sent over email, or viewing special characters on a web page. The goal is not to keep information secret, but rather to ensure that it’s able to be properly consumed
> The purpose of ENCRYPTION is to transform data in order to keep it secret from others. Encryption transforms data into another format in such a way that only specific individual(s) can reverse the transformation
> HASHING serves the purpose of ensuring integrity, i.e. making it so that if something is changed you can
@owlabz
owlabz / Security Engineer - Interview Questions.md
Created August 20, 2021 12:54 — forked from namishelex01/Security Engineer - Interview Questions.md
Cyber security engineer, Security Engineer, Security Analyst, Information Security Analyst and many more names

Core Information Security

  • What is information security and how is it achieved?

  • What are the core principles of information security?

  • What is the CIA triangle?

  • What is non-repudiation (as it applies to IT security)?

Cyber Security is an exotic field, and every next person wants to explore this domain and make a career in it, but the problem is they have no idea how to get in and even if they do, They don’t have any idea on what type of questions they might face in an interview.
Recently
@Miss_Malware
asked for everyone’s favourites security analyst and DFIR interview question that gave me an idea to compile a list of questions which are asked in every interview one way or another. What follows is a list of questions which you may face in an interview.