How to prepare a resume and some tips for regarding the selection process

I would like to provide few tips and I am sure those will help all the freshers to crack the selection process. Please forward it to all your friends who are looking for a job.


1) Resume preparation – Prepare your resume in such a way that it gives a +ve opinion about you to the recruiter. Being a project manager, They reject several resumes just by looking through them and without even interviewing them.

2) Please use  “professional email ids(Unlike lovexxxx, rockxxx, kingxxx) to send your resume”. They reject several profiles (Without even going through them) just because of the email ids.

3) Use proper covering letter/body text. I noticed several resumes without any body or with the texts like please do the needful, please call me if I get selected. I am sure recruiters will not like these types of covering letters and your resumes will be sent to Trash directly.

4) Please don’t forget to attach your resume – you might think that you are not a defaulter. But you will be shocked to know that Out of 10 resumes which they receive, At least 2 or 3 emails will be without attachments/resumes.

5) If you are sending resume to more than one recruiter, Please don’t copy all the IDs in CC. You might think whats wrong with it. But it is wrong. I can say it is personally to do with the ego of the person who is screening your resumes. If you are sending your profile to peers/competitors like TCS/Infosys/CTS at the same time it might result in not getting the call letter from all. Please include your name in CC and copy all the email ids in BCC. Or if possible send resume to all the email ids separately. I know it is a tough task, but is the best way I would say.

6) Please do not apply if you know that you are not eligible for that requirement. Several times, it is possible that you will get a call letter(from a company which you know that you are not eligible to apply but you applied) because of the carelessness view of the resumes of the recruiters. However you will get caught while joining/background verification.

7) Now you are all done with applying for the requirements and get a call letter. Please do the homework properly before applying for the written test. Make sure you go through the important topics in R.S.Agarwals book (for logical questions), going through the old question papers of that company from ******** web site without fail.

8) Please apply your intelligence/knowledge in written test. Make a calculation about how much time you need to spend for every question(BY dividing total number of questions with time provided). Again, It happened with one of my friends – He was a class topper in my class and his dream company is Infosys. During the written test, He spent almost 30 mins for a puzzle and didn’t get time to work on the other puzzles. Please do not do that mistake. Make sure that you are not spending “too” much time on a single question.

9) Assume that you are not selected in the written test, Please don’t give your hope. There are not the only IT companies in India and you have 1000+ options. Personally(Being a school/College topper, I appeared for 70+ written tests./interviews before getting into my dream company) I know how hard it is and you have to live with it.

10) Finally about Interview which is the Most critical part of the selection process.

Remember that you are trying to sell yourself. As long as you don’t go over the edge, all the marketing efforts that you can put in your resume (in its content, design, delivery method and so on) will give you an advantage over the other candidates.So share your views about the post “Frequently asked Interview questions and Answers” . If you any query regarding the placement Feel free to ask.

Check my Other post on Top 5 tips for Building Resume


What is Enumeration ??

Enumeration is the next process/steps after scanning and it is the process of gathering and compiling username, machine names, network resources, shares, and services and it also involves in active connections to systems and directed queries.

Why Enumeration is needed – We can get the answer of this question in System Hacking Cycle

system-hacking-cycleSo firstly we have to enumerate users ,crack the password and gain access to the system , Escalate to the level of administrator ,execute application like spywares, rootskit etc then hide hacking tools and source code and finally erase your tracks so that you will not be caught.

Technique For Enumeration

  • Extract user names using win2k Enumeration
  • Extract user names using SNMP
  • Extract user names using Email IDs
  • Extract information using default passwords
  • Brute force Active Directory

Tools Used for Enumeration

  1. Superscan
  2. ENUM
  3. PS Tools
  4. PsFile
  5. Ps Info
  6. Ps Kill
  7. Ps List

SNMP Enumeration – SNMP stand for Simple Network Managemnet Protocol.Managers send request to agents and the agents send back replies, the request and replies refer to a variable accesible to the agent softwares and manager can also sends requests to set values for certain variables.

Trap make the manager aware that something significant is  happened at the agent’s end of the things:

  1. A reboot
  2. An interface failure
  3. or something else that is potentially bad happened
what is enumeration

Management Information Base provides a standard represenattion of the SNMP agent’s avaliable information and where it is is the most basic element of network management. It adds new syntax types and add more manageable object of the MIB tree


Solarwinds – IT is a set of network management tools , the tools set of consist of are Discovery , Cisco tools , ping tools , MIB browser etc.

SNScan – Its a window based SNMP scanner that can effectively detect SNMP – devices on the network.


NTP Enumeration – Network Time protocol is designed to synchronized clocks of network computer. NTP uses UDP port 123 as its primary means of communication.


SMTP Enumeration – Simple Mail Transfer Protocol is used to send email messages as opposed to POP3 or IMAP which can be used to both send and receive message. Its generally relies on using Mail Exchange servers to direct the mail via Domain Name Server.

SMTP Scan – it is used to identify which mail server is used on a remote server especially when banner  obfuscation is taking place.

Web Enumeration – Hyper Text Transfer Protocol is used to World Wide Web to display and distribute the information.

Hope you are enjoying our Tutorials on Learn ABC of Hacking Keep Visiting !!


Reconnaissance as Footprinting

The objective of this post is about to learn about First phase of  attack that is Reconnaissance. How Reconnaissance perform ???. if you join our session from this post so i will suggest to read further post in categories of Learn Abc of ethical hacking

As we already read about Reconnaissance ie its is a preparatory phase where we gather all the information regarding Victim.Its the first step of Steps perform by hacker.

Reconnaissance as Footprinting
Reconnaissance as Footprinting

Footprinting is the blueprint of the security profile of an Organization undertaken in a methodological manner. We already talk about Footprinting. Now we discuss further

Steps of Footprinting

  1.  Find companie’s external and internal URLs
  2. Perform Whois lookup for personl detail
  3. Extract DNS information
  4. Mirror the entire websie an look up names
  5. Extract archives of the website
  6. Google search for company’s news and press releases
  7. Use people search for personal information of employees
  8. Find the physical location of the web server like neo tracer tool
  9. Analyze company’s infrastructure details from job postings
  10. Track the email.

There are certain things which is required for Reconnaissance phase is like Footprinting , Competitive Intelligence Gathering , E-mail Spiders , List of Footprinting tools and Website Copier. Some of these topic are already posted and some of will be publish as soon as possible.

Next Phase is should be Scanning which will be published shortly.

Keep visiting !!