Real experience sharing: Alibaba Security Engineer (four sides)
This article will share with you what questions I was asked when I was interviewing for a security position at Alibaba. I experienced a total of one, two, three and HR interviews. Let’s take a look at them together. I hope it will be helpful to friends in need. It’s helpful~
Security Job Interview Series: Alibaba Rookie-Security Engineer
Timeline:
x Delivery Security Engineer
x 16 one side
x 23 two side
x 32 Three sides
x 50 HR side
x 53 Oral intention
x 56 Formal Intention Email
One side
Duration: 30 minutes
Self-introduction
hw’s responsibilities
hw’s achievements
Share Interesting case
What are the differences between hw’s scores and rules every year
Will you dig loopholes other than hw
The idea of code audit, the audit process
Is the code audit based on Java or PHP
Is java used a lot?
Java deserialization (differences between fastjson, log4j, and its own deserialization)
How to repair java fastjson
Repair of java native deserialization (readObject, writeObject)
The idea of black box penetration testing
Logical loopholes in retrieving passwords
Have you ever done anything related to development, writing small tools, etc.
Understand Alibaba , Rookie?
Rhetorical question
二面
Duration: 35 minutes
Self-introduction
Let me talk about my hw experience this year
What is the difference between this hw and previous years? , different from previous years, rules, attack methods, etc.
Opinions on data analysis of the supply chain
About the code from the perspective of Party A Thoughts on audit
Opinions on unauthorized vulnerabilities, from a research and development perspective
Recent security incidents and opinions (chat Spring4shell and log4shell)
Can you tell me your views on these two (in fact, the interviewer asked about security incidents and opinions, but my answer was inexplicably the principle of the vulnerability. . )
Northwestern Polytechnical University attack, what do you think about such a thing
What do you think about the Shanghai data leakage incident
Talk about your views on the security industry from Party A’s perspective, security measures, security strategies and ideas, etc.
What are your own requirements in your career plan? , what do you think if you choose to take the rookie as the offer?
Why didn’t you stay in the internship 3
Reflective question
Overall, I didn’t ask any technical questions. Most of them were about my views on certain events and issues. The interviewer introduced a lot of Rookie’s operating model, industry, etc., including work routes. The overall interview experience was very good. Good
三面
Duration: 25 minutes
Introduce yourself
Introduce internship experience and project experience
Key points for writing POC, and which products will be written for POC
Key points for fingerprint identification
What are the key factors when working on a surveying and mapping engine?
hw results of internship 3
Can you achieve this result? What are the key factors
Talk about internship 3
Reflective question
## HR interview
Duration: 40 minutes- Self-introduction
- Talk about my views on offensive and defensive drills
- Let’s talk about the easiest or most common attack types from the defensive team’s perspective during offensive and defensive drills
- Let’s talk about the level of intention in the workplace
- Rhetorical question
PHP Video Tutorial》《Java Video Tutorial》
The above is the detailed content of Real experience sharing: Alibaba Security Engineer (four sides). For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











Choosing a Docker image for Node may seem like a trivial matter, but the size and potential vulnerabilities of the image can have a significant impact on your CI/CD process and security. So how do we choose the best Node.js Docker image?

Cross-domain is a scenario often encountered in development, and it is also an issue often discussed in interviews. Mastering common cross-domain solutions and the principles behind them can not only improve our development efficiency, but also perform better in interviews.

The Go framework is a set of components that extend Go's built-in libraries, providing pre-built functionality (such as web development and database operations). Popular Go frameworks include Gin (web development), GORM (database operations), and RESTful (API management). Middleware is an interceptor pattern in the HTTP request processing chain and is used to add functionality such as authentication or request logging without modifying the handler. Session management maintains session status by storing user data. You can use gorilla/sessions to manage sessions.

The JS singleton pattern is a commonly used design pattern that ensures that a class has only one instance. This mode is mainly used to manage global variables to avoid naming conflicts and repeated loading. It can also reduce memory usage and improve code maintainability and scalability.

What is JPA? How is it different from JDBC? JPA (JavaPersistence API) is a standard interface for object-relational mapping (ORM), which allows Java developers to use familiar Java objects to operate databases without writing SQL queries directly against the database. JDBC (JavaDatabaseConnectivity) is Java's standard API for connecting to databases. It requires developers to use SQL statements to operate the database. JPA encapsulates JDBC, provides a more convenient and higher-level API for object-relational mapping, and simplifies data access operations. In JPA, what is an entity? entity

How does JavaScript determine data type? This article will share with you 8 ways to use JS to determine data type, which can effectively help work and interviews. The interviewer smiled slightly after reading it.

This article will share with you what questions I was asked when I was interviewing Du Xiaoman Information Security Engineer (Financial Security Department). I went through one, two, and three interviews in total. Let’s take a look at it together. I hope it will help those in need. Friends can help~

The url module and querystring module are two very important URL processing modules. It is often used when developing node servers.