Penetration Tester Interview Questions and Answers

Milad Bonakdar
Author
Prepare for penetration tester interviews with practical questions on scoping, recon, vulnerability prioritization, Burp Suite, Metasploit, APIs, Active Directory, and reporting.
Introduction
A strong penetration tester interview answer shows three things: you can work within an agreed scope, you can test methodically, and you can explain risk in a way engineering and business teams can act on.
Use these questions to practice the practical parts of the role: scoping, reconnaissance, vulnerability prioritization, Burp Suite, Metasploit, API testing, Active Directory, and reporting. Keep every answer grounded in authorized testing, clear evidence, and remediation.
Penetration Testing Fundamentals
1. What are the phases of a penetration test?
Answer: A good methodology starts before any scanning. Clarify authorization, scope, rules of engagement, test windows, data-handling limits, and emergency contacts first. Then move through testing in a repeatable way:
1. Scoping and planning:
- Confirm written authorization, targets, exclusions, and rules of engagement
- Define objectives, success criteria, communication paths, and stop conditions
2. Reconnaissance and discovery:
- Gather passive and active intelligence
- Identify hosts, services, application flows, user roles, and exposed attack surface
3. Vulnerability analysis:
- Map findings to business impact and exploitability
- Validate scanner output manually before treating it as a finding
4. Exploitation and post-exploitation:
- Exploit only in-scope weaknesses needed to prove impact
- Check privilege boundaries, lateral movement paths, and data exposure without exceeding the rules
5. Reporting, cleanup, and retest:
- Document evidence, impact, reproduction steps, and remediation
- Remove test artifacts, debrief stakeholders, and retest fixes when requested
Reconnaissance Example:
Rarity: Very Common
Difficulty: Medium
Vulnerability Assessment
2. How do you prioritize vulnerabilities?
Answer: Use CVSS as a starting point, then adjust with exploitability, asset importance, data sensitivity, exposure, compensating controls, and whether the issue is already being exploited in the wild. Interviewers want to hear how you avoid treating every scanner result as equal.
CVSS Scoring:
- Critical (9.0-10.0): Remote code execution, authentication bypass
- High (7.0-8.9): SQL injection, XSS with data access
- Medium (4.0-6.9): Information disclosure, CSRF
- Low (0.1-3.9): Minor information leakage
Prioritization Factors:
Rarity: Very Common
Difficulty: Medium
Metasploit
3. How do you use Metasploit to exploit a vulnerability?
Answer: Metasploit Framework workflow:
Basic Exploitation:
Meterpreter Commands:
Payload Generation:
Rarity: Very Common
Difficulty: Medium-Hard
4. How do you perform privilege escalation?
Answer: Privilege escalation exploits misconfigurations to gain higher access levels.
Linux Privilege Escalation:
1. Enumeration:
2. Common Techniques:
SUID Exploitation:
Sudo Misconfiguration:
Kernel Exploits:
3. Automated Tools:
Windows Privilege Escalation:
1. Enumeration:
2. Common Techniques:
Unquoted Service Paths:
AlwaysInstallElevated:
Token Impersonation:
3. Automated Tools:
Rarity: Very Common
Difficulty: Hard
Burp Suite
5. How do you find SQL Injection using Burp Suite?
Answer: Systematic SQL injection testing:
1. Intercept Request:
2. Send to Repeater: Test manual payloads:
3. Use Intruder:
4. Analyze Responses:
- Different response lengths
- Error messages
- Time delays (blind SQLi)
Advanced Testing:
Rarity: Very Common
Difficulty: Medium
Web Application Testing
6. How do you test for XSS vulnerabilities?
Answer: Comprehensive XSS testing approach:
Types of XSS:
- Reflected: Payload in URL/form, reflected immediately
- Stored: Payload stored in database
- DOM-based: Client-side JavaScript vulnerability
Testing Methodology:
1. Identify Injection Points:
2. Bypass Filters:
3. Burp Suite XSS Testing:
4. Automated Scanning:
Rarity: Very Common
Difficulty: Medium
7. How do you test API security?
Answer: API security testing focuses on authentication, authorization, and input validation.
Common API Vulnerabilities:
1. Broken Authentication:
2. Broken Authorization:
3. Mass Assignment:
REST API Testing:
GraphQL Testing:
API Fuzzing:
Postman/Burp Suite:
OWASP API Security Top 10:
- Broken Object Level Authorization - Test IDOR
- Broken Authentication - Test weak tokens
- Excessive Data Exposure - Check response data
- Lack of Resources & Rate Limiting - Test DoS
- Broken Function Level Authorization - Test privilege escalation
- Mass Assignment - Test parameter pollution
- Security Misconfiguration - Check headers, CORS
- Injection - Test SQLi, NoSQLi, command injection
- Improper Assets Management - Find old API versions
- Insufficient Logging & Monitoring - Check audit logs
Rarity: Common
Difficulty: Medium-Hard
Network Penetration Testing
8. How do you perform network penetration testing?
Answer: Structured network assessment:
1. Network Discovery:
2. Port Scanning:
3. Vulnerability Scanning:
4. Exploitation:
5. Post-Exploitation:
Rarity: Very Common
Difficulty: Hard
9. How do you attack Active Directory environments?
Answer: Active Directory is a prime target with many attack vectors.
Enumeration:
BloodHound:
Kerberoasting:
AS-REP Roasting:
Pass-the-Hash:
Pass-the-Ticket:
Golden Ticket:
Silver Ticket:
DCSync Attack:
Lateral Movement:
Persistence:
Defense Evasion:
Rarity: Common
Difficulty: Hard
Reporting
10. What should a penetration testing report include?
Answer: Comprehensive reporting structure:
Executive Summary:
- High-level findings
- Business impact
- Risk overview
- Recommendations
Technical Details:
Sample finding: SQL Injection in Login Form
Severity: Critical (CVSS 9.8)
Description: The login form at /admin/login is vulnerable to SQL injection, allowing attackers to bypass authentication and access admin panel.
Affected Asset:
- URL: https://target.com/admin/login
- Parameter: username
- Method: POST
Proof of Concept:
Impact:
- Unauthorized access to admin panel
- Access to sensitive customer data
- Potential database compromise
Remediation:
- Use parameterized queries
- Implement input validation
- Apply principle of least privilege to database user
Rarity: Very Common
Difficulty: Medium
Conclusion
Penetration tester interviews require hands-on experience and deep technical knowledge. Focus on:
- Methodology: Structured testing approach, documentation
- Vulnerability Assessment: Risk prioritization, CVSS scoring
- Tools: Metasploit, Burp Suite, Nmap, custom scripts
- Privilege Escalation: Linux and Windows techniques, automation tools
- Web Testing: SQL injection, XSS, authentication bypass
- API Testing: REST/GraphQL security, authorization flaws
- Network Testing: Scanning, exploitation, lateral movement
- Active Directory: Kerberoasting, Pass-the-Hash, BloodHound
- Reporting: Clear documentation, business impact, remediation
Practice in legal labs and intentionally vulnerable applications, build a repeatable testing checklist, and practice writing findings as clearly as you practice exploitation. The best candidates can show judgment: when to stop, how to prove impact safely, and how to help a team fix the issue.


