188 points

I used to make jokes to juniors/interns like the above. Then I watched a junior start typing my joke in terminal, and I freaked out and stopped.

Sometimes I forget these jokes go over the heads of people.

permalink
report
reply
76 points

And this is exactly why I don’t make those jokes to people unless I know very well they’ll get it

permalink
report
parent
reply
32 points

I’ve seen frustrated senior start writing this. Sometimes it’s just a different state of mind that pushes us over critical thinking edge into the void.

permalink
report
parent
reply
19 points

The same brain state that leads to chocolate milk mashed potatoes

permalink
report
parent
reply
40 points

Same. I was working on a help desk years ago helping another agent with a call where the customer was being ignorant and I sent him a message that said something like “does he want us to wipe his ass for him too?” (Not that exactly but in the context of the situation it would have been similarly insulting). Next reply I get from the other agent was “he said no”.

😬

permalink
report
parent
reply
16 points

Yeah, you don’t want toddlers learning gun safety the hard way

permalink
report
parent
reply
8 points

I mean… it’s the best way to learn by being stupid and doing mistakes, but truly some mistakes are too much damage and does not help to learn or if we talk about other jobs can kill somebody.

permalink
report
parent
reply
5 points

I managed a homework help chatroom for EEs. One of them got a PI and was so happy. Another person suggested that they run that command. Later on the other person claimed they didn’t expect it to work.

It took me and another mod way too long to help the other guy fix his PI. Wasn’t really happy about it. The new rule I came up with was if you must must make a joke do something harmless like “touch /this” and reference MC Hammer.

permalink
report
parent
reply
120 points

I love when cheaters fail to prosper.

Back when I still used Reddit, so many posts were just CS students trying to get other Redditors to do their homework for them. I don’t think I ever came across any technical interview cheaters, but I’m sure there were some.

permalink
report
reply
73 points

I remember one interview I had with a candidate. It was for a database analyst position that required SQL.

The first round was typically a phone screen where I chat with the candidate, get to know them a bit.

Second round was code review. I asked them to do a SQL query that did x.

The queries were simple. The goal was to get the candidate to walk through the query.

I had one candid that, over screen share, wrote the query flawlessly. Then I asked them to explain what it was doing. The candidate froze.

I can get understand getting nervous so I moved onto an insert statement. I had them write one and then do another without using certain terms (often leading to a sub query).

Again, flawless. I asked what situations would you use one over the other.

Again, they froze. I started to get suspicious that they were cheating and had them, instead of typing the answer, say the answer. When they couldn’t, I knew enough that it wasn’t going to work.

permalink
report
parent
reply
34 points

I had an applicant very obviously read to me that Wikipedia article about Active Directory.

permalink
report
parent
reply
20 points

Knowing how to quickly look something up isn’t a bad skill. The problem is when that’s all they do

permalink
report
parent
reply
6 points

When in doubt I ask them what RAID 45 is.

permalink
report
parent
reply
22 points

A lot of the time I find “spot the bug” questions to be more informative, especially for junior roles. We stopped asking fizz-buzz - just about everyone has heard of it by now and it’s pretty easy to just rote learn a solution. Instead we give them the spec for fizz-buzz and a deliberately broken implementation and ask them to fix it. If they get flustered, just asking “what does this program output” usually give a pretty clear indication if they can reason about code in a systematic way.

permalink
report
parent
reply
5 points

That’s fine if there are no weird pedantic ropes to fall over. I am not a compiler or linker, that’s what I have compilers and linkers for. Same with an IDE. I don’t know many details of the stdlib or other common libs, because why should I waste space in my brain for stuff code completion can show me…

permalink
report
parent
reply
21 points

I wonder why people do this. You wouldn’t apply to a welding job if you can’t weld. Why so many people apply to programming positions if they can’t actually code (or a database analyst position without knowing SQL)?

permalink
report
parent
reply
15 points

Some people seem to think you can just Google stuff or more recently use AI to do the coding, not knowing that being a dev is mostly about knowing what to search and that being a dev isn’t just coding.

permalink
report
parent
reply
6 points

Money? Maybe the get the first pay until they get thrown out again.

permalink
report
parent
reply
2 points

My current job just hired someone as a senior Salesforce admin with a bunch of certs who in reality lacks any Salesforce skills at all. He’s been here for 6 months now and is really just dead weight on the team, but the only reason he hasnt been let go yet is because middle managent above him has its own host of issues, and the only reason he’s on thin ice is because of some of my team has been very loudly forwarding complaints against him up the chain and clearly communicating that he’s not showing the competencies that are required for the role and that he claimed to have. I give it another 6-12 months before he either gets fired or bounces

permalink
report
parent
reply
4 points

That’s where you refocus the conversation by saying “tell me what you do know”

permalink
report
parent
reply
2 points

I could freeze like that because of being only shy/nervous, just saying. Over things I knew.

Say, “what it does” may bear different weight when you are autistic. You try to grasp the thing from iron to logic to computers to B-trees to database itself etc.

To know that you only have to say a simple thing also requires experience which juniors may not have.

permalink
report
parent
reply
91 points

Did they execute the command on localhost or the remote? Because hey if they had privileges to root-nuke the target that’s gotta count for something right? Lmao

permalink
report
reply
60 points

The way this reads I think the company did not actually provide a good sandboxed environemt. So when they rm -rf /'d the thing they actually deleted a lot of stuff the recruiters still needed (likely the pentest environments for other candidates). Because imo that’s the only reason I can think of to just outright ban a candidate from applying for any other role at the company.

permalink
report
parent
reply
38 points

You should ban anyone who tries this regardless of the outcome. There is always a small chance they did it on purpose trying to cause damage. There is no benefit by giving them another chance, you just riks giving them the possibility of doing more damage. If the thing was a mistake, the person will learn from it and find another job.

permalink
report
parent
reply
25 points

If the task would have been to find general security risks this would have counted. I mean, he did some serious harm, but he was able to find a security issue.

permalink
report
parent
reply
2 points

We’ll I’m this case too, if true, the person didn’t know anything about the job they were aplyiyfor and tried to cheat their way into the company. Also not really great.

permalink
report
parent
reply
22 points

To be honest, considering the role they’re applying for, I would reject their job application too even if it occurred inside a sandboxed environment.

They should know exactly what rm -rf does. The fact they didn’t and they still arbitrary ran the command anyway… massive red flags. Could even say he failed to twart a social engineering attack.

permalink
report
parent
reply
13 points

The two cases, they knew what it was and they did it maliciously. They didn’t know what they were doing and got socially engineered in the process. Both cases are cause for failure.

permalink
report
parent
reply
12 points

To me it reads like the recruiter thought the person was a troll and banned them.

permalink
report
parent
reply
6 points

I mean it reads like a shitpost to me lol.

permalink
report
parent
reply
90 points

How are you supposed to fine 7 vulernabilities in an hour anyways? No way they expect the applicant to actually find vulernabilities right? So you need to memorize a bunch and see if they are present, which doesn’t achieve anything other than testing your memorization abilities

permalink
report
reply
99 points

How are you supposed to fine 7 vulernabilities in an hour anyways?

Threaten the interviewer with a knife until they give you at least 7 vulnerabilities. tapsheadmeme

permalink
report
parent
reply
66 points

Once again proving social engineering is king.

permalink
report
parent
reply
16 points

The biggest vulnerability is the user.

That being said, click this link to make an easy thousand dollars a day.

permalink
report
parent
reply
19 points

They always forget about the rubber hose exploit.

permalink
report
parent
reply
83 points

Using Kali? Easy if you have training. The capstone for our security course a decade ago was too find and exploit 5 remote machines (4 on the same network, 1 was on a second network only one of the machines had access to) in an hour with Kali. I found all 5 but could only exploit 3 of them. If I didn’t have to exploit any of them 7 would be reasonably easy to find.

Kali basically has a library of known exploits and you just run the scanner on a target.

This isn’t novel exploit discovery. This is “which of these 10 windows machines hasn’t been updated in 3 years?”

permalink
report
parent
reply
9 points

Just saying that running automated tools and identifying those vulnerabilities is just the first step to learning hacking, but nothing more. To gain a proper understanding you must be able to find vulnerabilities manually or at least understand a certain exploit such as ETERNALBLUE which you won’t really look for manually.

permalink
report
parent
reply
8 points

Sure. But for an entry level interview as a pen tester… Scanning with Kali should be an easy task.

permalink
report
parent
reply
40 points

It’s going to be a system set up with known vulnerabilities that should be easy to locate using common tools already installed on Kali; a real world scenario should (at least in theory) not be that simple, but in a capture the flag pentest environment, that’s pretty normal

permalink
report
parent
reply
18 points

You can see that the first machine is at /dvwa which is the Damn Vulnerable Web Application and is made for practicing hacking. If you have a basic understanding of the vulnerabilities there finding 7 of them is easy peasy.

permalink
report
parent
reply
7 points

A taser and 7 pairs of handcuffs

permalink
report
parent
reply
4 points

I can find a bunch with just nmap

permalink
report
parent
reply
3 points

mf wants you to work before even being hired

permalink
report
parent
reply
49 points

Sometimes you get what you deserve

permalink
report
reply
25 points

It’s clear the kid wasn’t up to the job. Why sit the interview?

permalink
report
parent
reply
7 points

Probably didn’t want to tell them to their face, provide a clinical facade behind which to judge them.

permalink
report
parent
reply

linuxmemes

!linuxmemes@lemmy.world

Create post

I use Arch btw


Sister communities:
Community rules
  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

Community stats

  • 7.5K

    Monthly active users

  • 1.3K

    Posts

  • 70K

    Comments