当前位置:网站首页>Interview questions of a blue team of Beijing Information Protection Network
Interview questions of a blue team of Beijing Information Protection Network
2022-04-23 15:40:00 【Less than two meters tall】
Recently, I participated in the of a letter 2022 Blue guard interview , I feel there is a big gap between the safety clothing work and the net protection blue team . Many of the questions raised by the interviewer are half solved . Today, I will sort out the topic of net protection , It's convenient for me to take the time to repeat and summarize the special problems .
Sort out the questions as follows :
1. Introduce yourself , Master skills and direction , Job content
2. common web Know what vulnerabilities
3. What are the functions of error reporting injection
4.updatexml What is the error reporting principle ;floor What is the principle of function error reporting
5. What is the principle of secondary injection ; What is the principle of Stack Injection ;
6. How to prevent sql Inject ;sql Injection disposal methods and repair suggestions
7.CSRF Vulnerability principle and repair method
8. common web Bug fixes ; What other bug fixes do you know
9. common web What is middleware
10. Let me talk about it. weblogic What are they? CVE
11.fastjson Loophole principle
12.shiro Principle of deserialization vulnerability , How to determine shiro frame ?
13. What other frameworks do you know ? What are the vulnerabilities of the framework ? How to repair ?
14.thinkphp There are some loopholes in the framework
15. What emergency experience do you have ? What are the emergency ideas ?
16. Flow analysis method ? Flow analysis ideas ?
17. See that the traffic log has scanning behavior , How to determine the authenticity of the source ip Address ?
18. How many domain contacts ? How much do you know about intranet ?
19. Talk about an intranet idea 、 Experience
20. Have you ever taken an emergency environment
21.OWASP TOP10 What are they? ?
22. XXE Is it right? TOP10?
23. What are the loophole shooting ranges ?
Probably remember so much , Others can't remember clearly .
Overall process : Call and make an appointment , Join Tencent Conference , Two interviewers met me alone , From the above answers, extend and expand , The total interview time is nearly half an hour . I'm a big girl. I got on the car head once , A little nervous , Many problems touch the blind spot of knowledge , The question is quite elaborate , An uncertainty can determine my level .....
summary
Originally, my personal expectation was that I prefer how to fight when I encounter loopholes , But the interview questions are more inclined to the underlying principles and repair methods ; Personal work tends to penetrate 、 Missing cleaning and other clothing work , The safety net is more inclined to emergency 、 Flow analysis and traceability methods . As for the blue team work, I personally think it is to look at the flow equipment to study and judge the alarm content , But two interviewers asked how to do domain and Intranet ........( Waldfa )
Some helplessness , But I also gained a lot of knowledge and experience , Now I have time to repeat the above framework , Although it has been done before, but the answer is not complete, it still shows that there are problems , There is still room for improvement .
The result of this interview is temporarily unknown , If successful, make persistent efforts , If you fail, learn from your experience , Keep an ordinary heart . The road of network security is blocked and long , Heroes work harder .
版权声明
本文为[Less than two meters tall]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231535026132.html
边栏推荐
- Demonstration meeting on startup and implementation scheme of swarm intelligence autonomous operation smart farm project
- Codejock Suite Pro v20. three
- What if the server is poisoned? How does the server prevent virus intrusion?
- Summary of interfaces for JDBC and servlet to write CRUD
- 今日睡眠质量记录76分
- 山寨版归并【上】
- 多级缓存使用
- Squid agent
- [leetcode daily question] install fence
- GFS distributed file system (Theory)
猜你喜欢
Independent operation smart farm Innovation Forum
Cookie&Session
MultiTimer v2 重构版本 | 一款可无限扩展的软件定时器
MySQL集群模式與應用場景
激活函数的优缺点和选择
Openstack command operation
MySQL Cluster Mode and application scenario
Configuration of multi spanning tree MSTP
布隆过滤器在亿级流量电商系统的应用
Basic concepts of website construction and management
随机推荐
Functions (Part I)
Explanation 2 of redis database (redis high availability, persistence and performance management)
Knn,Kmeans和GMM
Machine learning - logistic regression
Basic concepts of website construction and management
Multitimer V2 reconstruction version | an infinitely scalable software timer
Node. JS ODBC connection PostgreSQL
Cookie&Session
s16.基于镜像仓库一键安装containerd脚本
PHP PDO ODBC将一个文件夹的文件装载到MySQL数据库BLOB列,并将BLOB列下载到另一个文件夹
fatal error: torch/extension.h: No such file or directory
编译,连接 -- 笔记
Explanation of redis database (IV) master-slave replication, sentinel and cluster
删除字符串中出现次数最少的字符
Deep learning - Super parameter setting
pgpool-II 4.3 中文手册 - 入门教程
Wechat applet customer service access to send and receive messages
移动金融(自用)
群体智能自主作业智慧农场项目启动及实施方案论证会议
多生成树MSTP的配置