
BREAKTHROUGH TACTICS
Cyber Security | Ethical Hacking | Penetration Testing
Articles, Podcasts and Videos
By Mahfuz Talukder | IT and Cyber Security Professional
Cyber Security Interview Prep. Q12: "LFI and RFI"
Category: Red Team Question: What is the difference between LFI and RFI? How can attacks that exploit these vulnerabilities be prevented?...
Cyber Security Interview Prep. Q11: "PTES Pentesting Model"
Category: Red Team What is the PTES model? What are the stages and could you briefly describe each stage? PTES stands for "Pentesting...
Cyber Security Interview Prep. Q10: "ASREP Roasting"
Category: Red Team Question: What is ASREP Roasting? How does it work? Kerberos uses pre-authentication. This is where the user's...
Cyber Security Interview Prep. Q9: "Kerberoasting"
Category: Red Team Question: What is Kerberoasting? How does it work? Kerberoasting is a post exploitation attack that can be used for...
Cyber Security Interview Prep. Q8: "Kerberos Authentication"
Category: Security Question: What is Kerberos? How does it work? My Answer: Kerberos is an authentication Protocol used by Windows...
Cyber Security Interview Prep. Q7: "NTLM Authentication"
Category: Security Question: What is NTLM? How does it work? My answer: NTLM is an authentication protocol used by Windows machines. NTLM...
Cyber Security Interview Prep. Q6: "Active Directory Part 1"
Category: General IT Question: What is Active Directory (AD) and why would a company use it? My answer: Active Directory (AD) is a system...
Cyber Security Interview Prep. Q5: "Firewalls Part 1"
Category: Security What is a firewall? What are the different types? What is the difference between a stateless and stateful firewall? My...
Cyber Security Interview Prep. Q4: "Digital Signatures"
Category: Security "How can cryptography be used to create a digital signature for non-repudiation?" My answer: First of all,...
Cyber Security Interview Prep. Q3: "Symmetric & Asymmetric Encryption"
Category: Security "Explain the difference between symmetric encryption and asymmetric encryption" My answer: Both of these encryption...
Cyber Security Interview Prep. Q2: "Three-Way Handshake"
Category: General IT "What is the three-way handshake? What packets are sent and who is the sender and who is the recipient?" My answer:...
Cyber Security Interview Prep. Q1: "The OSI Model"
Category: General IT "The OSI model. What is it, how many layers does it have, and can you name them for me?" My answer: OSI is a model...













