I failed an important interview, but it made me better.

Поделиться
HTML-код
  • Опубликовано: 22 июн 2024
  • This is a story about an embarrassingly failed interview that I have had, that shaped my approach to security overall.
    Want to Connect?
    LinkedIn
    / vankperry
    Discord
    / discord

Комментарии • 7

  • @xCheddarB0b42x
    @xCheddarB0b42x 26 дней назад +1

    This is an important lesson from your story: the boundary of the candidate's knowledge will be found by a good interviewer. The candidate must get comfortable with finding the knowledge boundary and explaining to the interviewer how they studied it a long time ago, that they simply forgot some aspects while studying other material, that they know where to go to research the topic, that they will research it tonight before sleeping, and so on. Also, mock interviews help a lot to find these cracks and edges. Getting plugged in to a community can help the candidate find a study buddy with which to conduct mock interviews and become accustomed to confronting the boundary of their knowledge set. And expending it.

  • @ChoiceWars-cg7hn
    @ChoiceWars-cg7hn Месяц назад +2

    Whoa, this was like watching a movie, your storytelling, and the editing really is amazing , you're gonna go viral soon , mark my words.

    • @ChoiceWars-cg7hn
      @ChoiceWars-cg7hn Месяц назад +1

      Also may I know how you generated the AI images with your face on it ? Those look great.

    • @ethicalpap
      @ethicalpap  Месяц назад +2

      I actually don't know 😅. My editor does it for me. Here is his discord, if you want to reach out and ask.
      discord:
      skylar_chris

  • @DIYSEC
    @DIYSEC Месяц назад +1

    NTLM was the older hashing algorithm allowing a SSO with LDAP was vulnerable to pass the hash attacks NTLMv2 is most common now I believe, but I’m sure you researched your butt off after that interview, damn man you were close. Thanks for sharing!🎉

  • @blocktrade8998
    @blocktrade8998 26 дней назад

    User enters username password
    LDAPS forwards the request via plaintext to AD
    AD hashes the plaintext (Username and password) and checks the DB for a match.
    When the match is found AD sends back the response
    LDAPS informs the system of the result.
    Correct?

    • @ethicalpap
      @ethicalpap  26 дней назад +2

      Yep! LDAP can also encrypt the password before sending, allowing AD to decrypt with a corresponding private key