Application Security Engineer Interview Questions
Some of the questions/topics that i was asked when I was giving interviews for Application/Product Security Engineering roles. I am sure this is not an exhaustive list but I felt these questions were important to be asked and some were challenging to answer. I tried to include the reference resource for some of the questions/topics, feel free to reach out to me on Twitter for any feedback/suggestions/discussions.
-
Which architecture is more secure? 2 tier or 3 tier
-
Explain SSL Handshake
-
Explain Encryption, Hashing, and Encoding
-
Explain hashing and the hashing algorithms.
-
Recommend XXE mitigation for application that requires DTDs to be called because of business requirement
-
What are some of the common XML parsers?
-
Explain CORS and SOP
- https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS
- https://www.secjuice.com/crossoriginrequests/
- https://portswigger.net/web-security/cors
- https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy
- https://www.bedefended.com/papers/cors-security-guide
- The Same Origin Policy - Hacker History
-
Does SOP mitigate CSRF attacks?
-
Exploiting SSRF attacks
-
What is web cache deception?
- https://www.youtube.com/watch?v=3YLFZvxZbRc
- https://portswigger.net/web-security/web-cache-poisoning
- https://blog.cloudflare.com/understanding-our-cache-and-the-web-cache-deception-attack/
- http://omergil.blogspot.com/2017/02/web-cache-deception-attack.html
- https://portswigger.net/research/practical-web-cache-poisoning
-
What is HTTP request smuggling?
-
Explain DOM XSS. Can DOM XSS be stored? Can the CSP header mitigate dom-based XSS
- https://www.html5rocks.com/en/tutorials/internals/howbrowserswork/
- https://html.spec.whatwg.org/multipage/parsing.html
- https://portswigger.net/web-security/cross-site-scripting/dom-based
- https://brutelogic.com.br/blog/dom-based-xss-the-3-sinks/
- https://www.scip.ch/en/?labs.20171214
- Content-Security-Policy: An Introduction
- Deploying and managing CSP - the browser-side firewall
-
What will be your test case for a file upload functionality?
-
What is HSTS?
-
Explain SSL Stripping
-
If you have API calls that need to fetch credentials, what will be the secure way to store secrets and make them available for API calls?
-
How does file compression work?
-
Which method is secure? Compress First and then Encrypt the data or Encrypt First then Compress
-
You have found a vulnerability in a product/infrastructure, how will you investigate if this was not exploited already by an attacker
-
What is SPF, DKIM, and DMARC?
-
Why BlackList < WhiteList
-
Explain DNS Exfiltration
-
Explain Log Poisoning using LFI/RFI
-
Do the HttpOnly cookie and X-XSS-Protection header mitigate cross-site scripting attacks?
-
How do you exploit XSS in a post request?
-
Difference: IDOR, Missing function level access control and privilege escalation
-
How does the burp suite work with HTTPs requests?
-
Is the DNS service’s communication encrypted?
-
Security implications in DNS
-
DNS over HTTPs
-
How does SSH authentication work?
-
How to create and implement an SSL certificate?
-
How to verify if a database is encrypted?
-
Where will you store the credentials if you want a script to use credentials from the system?
-
Explain SDLC
-
In which phase of SDLC should security be integrated?
-
Can you briefly discuss the role of information security in each phase of the software development lifecycle?
-
Explain encryption in Wifi network communication.
-
What are stateless and stateful requests?
-
How is the state of a request saved in HTTP?
-
What data does the shadow file contains?
-
What is salt and pepper in cryptography?
-
What is Double-Submit Cookie and SameSite Cookie Attribute?
-
What is a Preflight request?
-
Remote Code Execution vs. Remote Command Execution vs. Code Injection vs. Command Injection vs. RCE
-
What are Certificate Transparency Logs?
-
What is your favorite vulnerability and why?
-
Talk about any latest/interesting vulnerability or breach you learned about
-
You’ve found XSS issue in the source code, what will be your best approach to address this?
-
You found that one of your applications uses a vulnerable dependency named X, what would be your best approach to address this issue?
-
Are open-source projects more or less secure than proprietary ones?
-
What are the technology stacks that your engineers work with?
Further readings and references:
- Resources for Application Security
- Web AppSec Interview Questions
- (Technical) Infosec Core Competencies
- Security Engineer Interview Questions by AppSecEngineer
- How to prepare for a security engineer interview
- Security Engineer Interview at tech giants
- Security Engineering at Google: Interview Study Notes
- Experience with Google interview for information security engineer
- Security Engineer Interview Questions
- Security Engineer - Interview Questions
- web-security-interview-questions
- Penetration Testing Interview Questions Cheat Sheet
- 60 Cybersecurity Interview Questions 2019 Update
- What To Know For Your First InfoSec Interview
- App Sec / Pentest Experienced Interview Questions (2–6 yrs)
- Offensive Interview Questions
- Web AppSec interview questions every company should ask
- Application Security Engineer Interview Questions & Answers
- 41 Interesting Application security interview questions
- Interview Questions to ask as a candidate
- Questions to Ask When Interviewing for Cloud Security Roles
- 5 questions you should ask your future manager when interviewing for a job
- 25+ DevSecOps Interview Questions and Answers for 2023