INTERVIEW

Master Ethical Hacker Interviews

Realistic questions, expert model answers, and a practice pack to boost your confidence

12 Questions
120 min Prep Time
5 Categories
STAR Method
What You'll Learn
To equip aspiring and experienced ethical hackers with targeted interview questions, model answers, and actionable insights that align with industry expectations.
  • Cover technical, scenario‑based, and behavioral questions
  • Provide STAR‑structured model answers
  • Highlight key competencies and red flags
  • Offer a timed practice pack for interview drills
Difficulty Mix
Easy: 35%
Medium: 40%
Hard: 25%
Prep Overview
Estimated Prep Time: 120 minutes
Formats: scenario‑based, technical, behavioral
Competency Map
Network Security: 25%
Vulnerability Assessment: 20%
Exploitation Techniques: 20%
Risk Management: 15%
Communication & Reporting: 20%

Technical Foundations

Explain the difference between symmetric and asymmetric encryption.
Situation

During a security audit I needed to recommend encryption for data at rest and in transit.

Task

Clarify the core concepts and appropriate use‑cases for each type of encryption.

Action

Described that symmetric encryption uses a single shared key for both encryption and decryption, offering speed and efficiency for large data volumes. Contrasted it with asymmetric encryption, which uses a public‑private key pair, enabling secure key exchange and digital signatures but with higher computational cost.

Result

The audit team selected AES for database encryption (symmetric) and RSA for secure email and key exchange (asymmetric), improving both performance and security.

Follow‑up Questions
  • Can you give examples of when you’d combine both methods?
  • What are the main security concerns for each type?
Evaluation Criteria
  • Clear definition of both types
  • Correct examples of algorithms
  • Appropriate use‑case mapping
Red Flags to Avoid
  • Mixing up key concepts
  • No mention of performance vs. security trade‑off
Answer Outline
  • Symmetric: one key, fast, examples: AES, DES
  • Asymmetric: key pair, slower, examples: RSA, ECC
  • Typical use‑cases: bulk data vs. key exchange/digital signatures
Tip
Mention hybrid encryption where a symmetric session key is exchanged using asymmetric encryption.
What is a zero‑day vulnerability?
Situation

While reviewing threat intel for a client, a new exploit was reported that had no public patch.

Task

Explain the concept and its implications to the client’s security team.

Action

Defined a zero‑day as a software flaw unknown to the vendor and therefore unpatched, highlighting that attackers can exploit it before a fix is released. Discussed the high risk, limited mitigation options, and the need for compensating controls such as network segmentation and intrusion detection signatures.

Result

The client implemented additional monitoring and isolated critical assets, reducing exposure until the vendor issued a patch two weeks later.

Follow‑up Questions
  • How would you prioritize remediation for a zero‑day?
  • What sources do you use to stay informed about zero‑days?
Evaluation Criteria
  • Accurate definition
  • Understanding of risk level
  • Practical mitigation steps
Red Flags to Avoid
  • Confusing zero‑day with known vulnerability
  • No mitigation ideas
Answer Outline
  • Definition: unknown to vendor, no patch
  • High risk because attackers have exclusive knowledge
  • Mitigation: detection, segmentation, threat intel, rapid patching once available
Tip
Emphasize the importance of a robust incident response plan for zero‑day scenarios.
Describe the OSI model and which layers are most relevant for a penetration test.
Situation

During a network assessment I needed to explain testing scope to a junior analyst.

Task

Identify OSI layers and pinpoint those most targeted during pen testing.

Action

Briefly outlined the seven OSI layers, then highlighted the Physical, Data Link, Network, Transport, and Application layers as primary focus areas. Explained that attacks often target Network (IP spoofing), Transport (TCP/UDP attacks), and Application (SQL injection, XSS) layers, while Physical and Data Link are relevant for wireless or hardware‑based exploits.

Result

The junior analyst understood where to concentrate scanning tools and manual testing, leading to a more efficient assessment.

Follow‑up Questions
  • Why might the Session layer be less targeted?
  • How does the OSI model help in mapping vulnerabilities to defenses?
Evaluation Criteria
  • Correct layer list
  • Clear relevance to pen testing
  • Practical examples
Red Flags to Avoid
  • Listing layers incorrectly
  • Ignoring Application layer
Answer Outline
  • 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application
  • Pen‑test focus: Network, Transport, Application (plus Physical/Data Link for wireless)
Tip
Tie each layer to common attack techniques for stronger impact.
How does a firewall differ from an IDS?
Situation

In a client meeting I was asked to justify investment in both technologies.

Task

Clarify functional differences and complementary roles.

Action

Explained that a firewall is a preventive control that enforces policy by allowing or blocking traffic based on rules (stateful inspection, packet filtering). An IDS is a detective control that monitors traffic for suspicious patterns and alerts but does not block. Highlighted that firewalls act on the network perimeter, while IDS can be placed inline (IPS) or passive for deeper inspection.

Result

The client approved a layered security approach, deploying a next‑gen firewall alongside a network IDS, improving both prevention and detection capabilities.

Follow‑up Questions
  • What are the limitations of a pure firewall approach?
  • When would you choose an IPS over an IDS?
Evaluation Criteria
  • Accurate functional distinction
  • Understanding of preventive vs. detective
Red Flags to Avoid
  • Saying IDS blocks traffic
  • Confusing IDS with antivirus
Answer Outline
  • Firewall: rule‑based, blocks/allows, preventive
  • IDS: monitors, alerts, detective
  • Key difference: action vs. observation
Tip
Mention that modern firewalls often include IDS/IPS features, blurring lines.

Penetration Testing Scenarios

Walk me through how you would conduct a web application penetration test.
Situation

A fintech startup hired me to assess the security of their new customer portal before launch.

Task

Perform a comprehensive web application penetration test following industry best practices.

Action

Started with a scoping meeting to define scope, rules of engagement, and data handling. Conducted reconnaissance (subdomain enumeration, technology fingerprinting). Performed automated scanning (OWASP ZAP, Burp Suite) to identify low‑hanging bugs. Followed with manual testing: input validation checks (SQLi, XSS), authentication bypass, session management review, business logic flaws, and API testing. Documented each finding with proof‑of‑concept, risk rating, and remediation advice. Delivered a detailed report and a debrief meeting with developers.

Result

The client remediated critical SQL injection and XSS issues, hardened authentication, and launched the portal with confidence, reducing potential breach risk by an estimated 80%.

Follow‑up Questions
  • How do you handle false positives from automated tools?
  • What techniques do you use for testing modern single‑page applications?
Evaluation Criteria
  • Methodical approach
  • Coverage of OWASP Top 10
  • Clear reporting process
Red Flags to Avoid
  • Skipping manual verification
  • No mention of client communication
Answer Outline
  • Scope & RoE
  • Reconnaissance
  • Automated scanning
  • Manual testing (injection, auth, session, logic, API)
  • Reporting & remediation guidance
Tip
Emphasize the importance of validating automated findings manually before reporting.
You find a critical vulnerability in a client’s production system. What steps do you take?
Situation

During a live penetration test for a healthcare provider, I discovered an unauthenticated remote code execution in their patient portal.

Task

Ensure the vulnerability is responsibly disclosed and mitigated without exposing patient data.

Action

Immediately paused testing to avoid exploitation, documented the finding with minimal detail, and alerted the on‑call security lead per the agreed RoE. Provided a high‑level description, potential impact, and recommended immediate containment (e.g., disable the vulnerable endpoint). Coordinated with the client’s incident response team to apply a temporary fix, then worked on a detailed proof‑of‑concept for the final report after the client confirmed containment. Followed up to verify remediation and retested the fix.

Result

The client applied a patch within 24 hours, preventing potential data breach. The responsible disclosure process maintained trust and compliance with HIPAA regulations.

Follow‑up Questions
  • What if the client’s response is delayed?
  • How do you document the finding to satisfy compliance audits?
Evaluation Criteria
  • Speed of response
  • Adherence to RoE
  • Clear communication of risk
  • Collaboration with incident response
Red Flags to Avoid
  • Continuing exploitation
  • Disclosing full exploit publicly
Answer Outline
  • Pause testing
  • Notify client per RoE
  • Provide high‑level impact
  • Assist with containment
  • Prepare detailed PO C after containment
  • Verify remediation
Tip
Always prioritize client safety over demonstration; keep detailed logs for later reporting.
Explain how you would perform a privilege escalation on a Linux machine.
Situation

In a capture‑the‑flag exercise I gained low‑privilege user access on a Ubuntu 20.04 host.

Task

Escalate to root privileges using available system information.

Action

Enumerated the system (uname -a, cat /etc/os-release, sudo -l, env). Identified an outdated kernel with a known CVE (Dirty COW) and a misconfigured SUID binary. Attempted the Dirty COW exploit, which succeeded, granting write access to /etc/passwd. Modified the root password entry, then switched to root using su. Also documented the SUID binary as a secondary path.

Result

Achieved root access, captured the flag, and highlighted two distinct escalation vectors for the final write‑up.

Follow‑up Questions
  • What mitigations can prevent Dirty COW exploitation?
  • How would you handle a system with SELinux enforcing?
Evaluation Criteria
  • Thorough enumeration
  • Correct exploit choice
  • Understanding of mitigation
Red Flags to Avoid
  • Skipping enumeration
  • Using outdated exploits without verification
Answer Outline
  • System enumeration
  • Identify vulnerable kernel or SUID binaries
  • Exploit (e.g., Dirty COW)
  • Gain root and verify
Tip
Always check for kernel version and SUID binaries before jumping to a specific exploit.
Describe the process of creating a custom exploit for a known vulnerability.
Situation

A client’s legacy web server ran an outdated version of Apache with a known buffer overflow in mod_status.

Task

Develop a reliable exploit to demonstrate the risk and aid remediation planning.

Action

Collected detailed vulnerability details from CVE‑2017‑3167, including vulnerable function and offset. Set up a controlled lab mirroring the target environment. Crafted a proof‑of‑concept in C that overwrote the return address with a ROP chain to spawn a reverse shell. Used pattern_create/pattern_offset from Metasploit to determine exact offset. Tested against the lab server, refined payload to avoid NOP sled issues, and added reliability checks. Documented the exploit steps, required conditions, and mitigation recommendations (patch upgrade, input validation).

Result

The exploit successfully executed on the lab server, providing a clear demonstration of remote code execution risk. The client applied the official patch and disabled mod_status, eliminating the vulnerability.

Follow‑up Questions
  • How do you ensure the exploit does not cause denial‑of‑service during testing?
  • What legal considerations apply when developing custom exploits?
Evaluation Criteria
  • Methodical lab setup
  • Accurate offset calculation
  • Safe testing practices
Red Flags to Avoid
  • Running exploit on production without permission
  • Lack of documentation
Answer Outline
  • Gather vulnerability details (CVE, affected function)
  • Recreate target environment
  • Determine offset (pattern tools)
  • Write payload (e.g., ROP chain)
  • Test and refine in lab
  • Document exploit and mitigations
Tip
Always use a isolated lab and include cleanup steps to avoid collateral damage.

Professional & Ethical Considerations

How do you handle discovering sensitive data during a test?
Situation

During a network scan for a retail client I uncovered a database dump containing customer credit‑card numbers.

Task

Protect the data while ensuring the client is aware of the breach risk.

Action

Immediately halted further data extraction, logged the finding with minimal exposure, and notified the client’s security lead per the RoE. Explained the scope of the data, potential compliance impact (PCI‑DSS), and recommended immediate isolation of the database, encryption, and incident response activation. Assisted in securing the dump and provided guidance on remediation and notification procedures.

Result

The client contained the exposure within hours, initiated a PCI‑DSS investigation, and avoided public disclosure, preserving brand reputation.

Follow‑up Questions
  • What if the client’s response is delayed?
  • How would you document the finding for audit purposes?
Evaluation Criteria
  • Prompt action
  • Compliance awareness
  • Clear communication
Red Flags to Avoid
  • Continuing to download data
  • Failing to report promptly
Answer Outline
  • Stop data collection
  • Log minimal details
  • Notify client per RoE
  • Explain impact and compliance
  • Assist with containment
Tip
Treat any discovered PII as a potential breach and act accordingly.
What is your approach to maintaining confidentiality and integrity of client data?
Situation

Throughout my engagements I handle sensitive network diagrams, credentials, and vulnerability reports.

Task

Implement safeguards that protect data both at rest and in transit.

Action

Use encrypted storage (AES‑256 encrypted drives) for all client files, enforce strong, unique passwords, and enable two‑factor authentication on all tools. Transfer data over VPN or TLS‑encrypted channels. Sign NDAs, limit data access to team members on a need‑to‑know basis, and regularly purge data after project completion per the contract. Conduct periodic security reviews of my own environment to ensure no leakage.

Result

No incidents of data leakage across multiple engagements, and clients consistently commend the rigorous confidentiality standards.

Follow‑up Questions
  • How do you verify that third‑party tools meet your security standards?
  • What steps do you take if a device is lost during an engagement?
Evaluation Criteria
  • Use of encryption
  • Access limitation
  • Clear data lifecycle
Red Flags to Avoid
  • Storing passwords in plain text
  • Sharing files over unsecured channels
Answer Outline
  • Encrypted storage
  • Secure transmission (VPN/TLS)
  • Access controls & NDAs
  • Data retention & disposal
  • Regular self‑audits
Tip
Document your data handling policy and share it with the client during kickoff.
Explain the importance of a Rules of Engagement (RoE) document.
Situation

Before starting a penetration test for a financial services firm, the project lead asked about the scope and legal boundaries.

Task

Clarify why a detailed RoE is critical for both parties.

Action

Described that the RoE defines the testing scope, allowed techniques, time windows, and escalation procedures, protecting the client from unintended service disruption and the tester from legal liability. Highlighted that it establishes communication channels, defines data handling, and sets expectations for reporting, ensuring compliance with regulations such as GDPR or PCI‑DSS.

Result

The client approved a comprehensive RoE, which later helped resolve a minor service outage quickly by following the predefined escalation path.

Follow‑up Questions
  • What elements would you add for a red‑team engagement?
  • How do you handle scope changes mid‑engagement?
Evaluation Criteria
  • Clarity of purpose
  • Legal risk mitigation
  • Operational guidance
Red Flags to Avoid
  • Treating RoE as optional
  • Vague scope definitions
Answer Outline
  • Scope definition
  • Allowed techniques & tools
  • Time windows
  • Escalation & communication
  • Legal protection
Tip
Treat the RoE as a contract; get signatures from both parties.
Describe a time you had to communicate a difficult security finding to non‑technical stakeholders.
Situation

During a penetration test for a manufacturing company, I uncovered a critical remote code execution vulnerability in their SCADA system.

Task

Explain the risk and remediation steps to the plant manager and executive team, none of whom had a technical background.

Action

Prepared a concise executive summary using business‑focused language: described the vulnerability as a 'door that could be opened by an attacker to control machinery,' quantified potential downtime costs, and linked it to safety regulations. Used analogies (e.g., 'like a broken lock on a factory gate') and visual diagrams. Presented a prioritized remediation plan with clear timelines and assigned responsibilities, and offered to conduct a follow‑up workshop for the IT staff.

Result

The executives approved immediate patching and allocated budget for a security upgrade, preventing a potential production halt and reinforcing safety compliance.

Follow‑up Questions
  • How do you gauge the audience’s understanding during the briefing?
  • What visual aids are most effective for non‑technical stakeholders?
Evaluation Criteria
  • Clarity
  • Business relevance
  • Actionable recommendations
Red Flags to Avoid
  • Overly technical jargon
  • Downplaying severity
Answer Outline
  • Executive summary with business impact
  • Analogies for technical concepts
  • Quantify risk (cost, downtime)
  • Prioritized remediation plan
  • Offer follow‑up support
Tip
Focus on impact, not just technical details, and provide a clear next‑step roadmap.
ATS Tips
  • penetration testing
  • vulnerability assessment
  • network security
  • ethical hacking
  • risk management
  • exploit development
  • security auditing
Boost your ethical hacker resume now!
Practice Pack
Timed Rounds: 60 minutes
Mix: technical, behavioral, scenario

Ready to ace your ethical hacker interview? Get personalized coaching!

Start Free Consultation

More Interview Guides

Check out Resumly's Free AI Tools