Salary data sourced from the U.S. Bureau of Labor Statistics (May 2024). Figures are estimates and vary by location, experience, company size, and other factors.
Penetration Tester interviews assess your offensive security skills, methodology, and reporting ability. Expect hands-on scenarios, questions about specific tools and techniques, and discussions about responsible disclosure and client communication.
Q1. You have gained a low-privilege shell on a Windows domain machine. Walk me through your privilege escalation methodology.
What they evaluate
Windows privilege escalation knowledge and systematic approach
Strong answer framework
Start with local enumeration: whoami /priv, service configurations, unquoted service paths, scheduled tasks, and AlwaysInstallElevated. Check for stored credentials and token impersonation opportunities. Describe tools like WinPEAS or PowerUp and explain which findings you prioritize. Mention that you document each step for the report.
Common mistake
Running automated tools without understanding the results or being able to explain the underlying vulnerability.
Q2. Explain how you would perform an Active Directory attack path analysis after compromising a domain-joined workstation.
What they evaluate
Active Directory attack knowledge and lateral movement planning
Strong answer framework
Collect AD data using BloodHound/SharpHound to map trust relationships, group memberships, and Kerberoastable accounts. Identify shortest paths to Domain Admin. Describe how you chain techniques: Kerberoasting, AS-REP roasting, delegation abuse, and pass-the-hash. Emphasize that you validate findings manually before exploitation.
Common mistake
Relying entirely on BloodHound output without understanding the underlying AD misconfigurations.
Q3. How do you scope a web application penetration test? What questions do you ask the client before starting?
What they evaluate
Engagement scoping skills and professionalism
Strong answer framework
Ask about target URLs, authentication roles, test vs production environment, rate limiting concerns, and out-of-scope functionality. Clarify whether you are testing API endpoints, mobile backends, or just the web frontend. Confirm the rules of engagement, emergency contacts, and reporting timeline. Scoping directly affects test quality.
Common mistake
Starting testing without clearly defined scope, leading to incomplete coverage or testing out-of-scope assets.
Q4. Describe how a SQL injection attack works and demonstrate your approach to identifying one in a black-box test.
What they evaluate
Web application vulnerability knowledge and testing methodology
Strong answer framework
Explain that SQL injection occurs when user input is concatenated into SQL queries without parameterization. In black-box testing, inject single quotes and boolean-based payloads into every input field and URL parameter. Observe error messages, response timing, and content differences. Mention automated tools like sqlmap but stress that manual validation confirms the finding.
Common mistake
Only testing login forms and ignoring URL parameters, headers, and cookies as injection points.
Q5. A client's web application uses JWT tokens for authentication. How would you test for JWT-related vulnerabilities?
What they evaluate
Token-based authentication security knowledge
Strong answer framework
Test for algorithm confusion (changing RS256 to HS256), none algorithm acceptance, weak signing secrets, expired token acceptance, and missing audience/issuer validation. Use tools like jwt_tool. Check if the server validates the signature or just decodes the payload. Report the business impact of each finding.
Common mistake
Only checking for weak secrets without testing algorithm confusion and claim validation.
Q6. You discover a critical RCE vulnerability during a penetration test, but the engagement rules say report-only with no active exploitation. What do you do?
What they evaluate
Professional ethics and rules of engagement adherence
Strong answer framework
Document the finding with proof of concept that demonstrates the vulnerability without executing code. Immediately notify the client point of contact given the severity. Provide remediation guidance in your interim report. Never exceed the agreed scope, even when the finding is tempting to pursue.
Common mistake
Exploiting the vulnerability to show impact, violating the agreed rules of engagement.
Q7. How do you bypass Windows Defender or EDR during an engagement, and how do you report this to the client?
What they evaluate
Evasion techniques and responsible reporting
Strong answer framework
Describe techniques like custom payload generation, AMSI bypass, reflective DLL loading, or syscall-based execution. Emphasize that evasion is part of simulating real threats. In reporting, explain exactly what control was bypassed, how, and what the client should configure or request from their vendor to detect the technique.
Common mistake
Using off-the-shelf tools that get caught immediately, or not explaining how the client can improve detection.
Q8. Explain the difference between a vulnerability assessment and a penetration test. When would you recommend each?
What they evaluate
Service offering understanding and client advisory skills
Strong answer framework
A vulnerability assessment scans for known issues and reports them with severity ratings. A penetration test chains vulnerabilities together to demonstrate real attack paths and business impact. Recommend assessments for organizations building baseline visibility and pen tests for organizations ready to measure their defense against simulated attacks.
Common mistake
Describing penetration testing as just running Nessus or Qualys scans.
Q9. Walk me through how you would conduct a phishing campaign as part of a social engineering engagement.
What they evaluate
Social engineering methodology and campaign design
Strong answer framework
Start with OSINT to gather employee names, email formats, and organizational context. Design a pretext that matches the company's communication style. Set up the phishing infrastructure: look-alike domain, landing page, and tracking. Describe your metrics (click rate, credential submission rate) and how you report results without shaming individuals.
Common mistake
Creating unrealistic phishing scenarios that do not reflect actual threat actor tactics.
Q10. You find an SSRF vulnerability in a web application. How do you determine its impact and what can you access through it?
What they evaluate
Server-side request forgery exploitation knowledge
Strong answer framework
Test internal network access by targeting cloud metadata endpoints (169.254.169.254), internal services, and localhost ports. Check if the SSRF allows different protocols (file://, gopher://). Determine whether you can read responses or if it is blind. Explain the impact: internal service discovery, credential theft from metadata, or lateral movement.
Common mistake
Reporting SSRF as low severity without attempting to demonstrate access to internal resources or metadata.
Q11. How do you write a penetration test report that is useful to both technical and executive audiences?
What they evaluate
Report writing and communication skills
Strong answer framework
Structure the report with an executive summary (business risk, key findings, remediation priorities) and a technical section (step-by-step reproduction, evidence, and fix guidance). Use risk ratings tied to business impact, not just CVSS. Include remediation verification steps so the client knows when each finding is truly fixed.
Common mistake
Writing reports with only technical detail that executives cannot understand or act on.
Q12. Describe your approach to testing API endpoints that require authentication and role-based access control.
What they evaluate
API security testing skills and access control validation
Strong answer framework
Obtain tokens for each role level. Test horizontal privilege escalation (accessing another user's data) and vertical privilege escalation (performing admin actions with a regular token). Check for IDOR vulnerabilities by manipulating object IDs. Test rate limiting, input validation, and mass assignment on every endpoint.
Common mistake
Only testing with an admin account and missing access control flaws that affect lower-privilege users.
Q13. What is Kerberoasting and how do you execute it during an internal network penetration test?
What they evaluate
Active Directory attack technique knowledge
Strong answer framework
Kerberoasting requests TGS tickets for service accounts with SPNs, then cracks them offline. Explain that you query AD for accounts with SPNs, request tickets using GetUserSPNs.py or Rubeus, and crack them with hashcat. Emphasize that this attack requires only a domain user account. Describe the impact: service account credentials often have high privileges.
Common mistake
Not explaining why service account passwords are frequently weak and how the attack avoids detection.
Q14. How do you keep your offensive security skills current when new defenses and attack techniques emerge regularly?
What they evaluate
Continuous learning habits and professional development
Strong answer framework
Mention specific resources: HackTheBox, TryHackMe, CTF competitions, and security research blogs. Describe how you practice new techniques in a lab environment before using them in engagements. Reference recent techniques you learned and applied. Show that your learning is hands-on, not just reading.
Common mistake
Claiming to stay current by reading news articles without demonstrating hands-on practice.
Q15. A client asks you to test their network but refuses to provide any credentials. How do you approach this assumed-breach versus black-box decision?
What they evaluate
Engagement strategy and client advisory ability
Strong answer framework
Explain the trade-offs: black-box simulates an external attacker but may waste time on initial access. Assumed-breach (provided credentials) maximizes the time spent testing internal controls. Recommend the approach based on the client's maturity and goals. Offer to split the engagement: external first, then assumed-breach for internal.
Common mistake
Accepting any scope without discussing how the approach affects the value and coverage of the test.
Bring a portfolio of CTF writeups, bug bounty findings, or redacted penetration test reports that show your methodology. Demonstrate that you can explain complex attacks to non-technical audiences. Show familiarity with current offensive tooling but emphasize that you understand the underlying techniques, not just the tools. Mention any CVEs you have discovered or responsible disclosures you have made.
The median salary for a Penetration Tester is approximately $105,000 (Source: BLS, 2024 data). Penetration testing salaries increase sharply with specialization. Web app testers earn differently than red team operators or IoT testers. OSCP, OSEP, and GPEN certifications are strong negotiation points. If you have bug bounty earnings or published research, use them as proof of skill that justifies premium compensation.
Penetration Tester interviews cover Penetration Tester interviews assess your offensive security skills, methodology, and reporting ability. Expect hands-on scenarios, questions about specific tools and techniques, and discussions about responsible disclosure and client communication. This guide includes 15 original questions with answer frameworks.
Bring a portfolio of CTF writeups, bug bounty findings, or redacted penetration test reports that show your methodology. Demonstrate that you can explain complex attacks to non-technical audiences. Show familiarity with current offensive tooling but emphasize that you understand the underlying techniques, not just the tools. Mention any CVEs you have discovered or responsible disclosures you have made.
Interview questions are representative examples for educational preparation. Actual interview questions vary by company and role. DecipherU does not guarantee these questions will appear in any interview.
Was this page helpful?
Join cybersecurity professionals receiving weekly intelligence on threats, job market trends, salary data, and career growth strategies.
Weekly insights on threats, job trends, and career growth.
Unsubscribe anytime. More options