Defensive Security Intro

What is this page about?

Hello everyone, this is NotAlive.
On this page, I will be summarizing the Defensive Security Intro room from TryHackMe.
If you are new, I would recommend not reading this, as it is mainly meant for revision.
Let's get started.

1. Introduction to Defensive Security

In the previous write-up, we learned what Offensive Security is. This is similar to that, but now we are going to see what Defensive Security is.

In this, we have two main tasks:
1. Preventing intrusions from occurring
2. Detecting intrusions when they occur and responding properly

Tasks related to Defensive Security:

Categories of Defensive Security:

2. Areas of Defensive Security

The module covers two topics:


Security Operations Center (SOC)

A SOC is a team that monitors networks and systems to detect malicious cybersecurity events:

Security operations cover various tasks to ensure protection; one such task is threat intelligence.

Threat Intelligence

This is about how well you know the enemy and who else could be a potential enemy. This helps us better prepare against potential adversaries.

Different companies have different adversaries. Some adversaries might seek to steal customer data from a mobile operator; however, other adversaries may be more interested in halting production in a petroleum refinery.

Example adversaries include a nation-state cyber army working for political reasons and a ransomware group acting for financial gain. Based on the company being targeted, we can expect different types of adversaries.

Intelligence needs data, and data needs to be collected.
Data can be gathered from sources like network logs and public sources; this process can also be called OSINT.

So basically, Threat Intelligence is all about predicting who might be a potential threat to the company and understanding their tactics, techniques, and procedures so that we can mitigate the consequences.

Digital Forensics and Incident Response (DFIR)

We are going to cover:

Digital Forensics

Forensic science emerged from the need to investigate crimes and establish facts. In digital forensics, this is all about discovering how and who is behind a cyberattack.

In the world of cybersecurity, digital forensics is not just about solving past crimes; it is a critical pillar of defensive security. Instead of looking at physical evidence, experts investigate digital footprints to uncover what happened.

Incident Response

An incident usually refers to a data breach or cyberattack; however, in some cases, it can be something less critical, such as a misconfiguration, an intrusion attempt, or a policy violation.

Incident response specifies the methodology that should be followed to handle such a case. The aim is to reduce damage and recover in the shortest time possible. Ideally, you would develop a plan that is ready before an incident occurs.

The four major phases of the incident response process are:

Malware Analysis

Malware comes in many forms, such as:

Malware Analysis aims to learn about such malicious programs using various means:

3. Practical Example of Defensive Security

They simulated the threat by giving us a UI of an SOC panel and walking us through it.
It will be a little difficult to copy the IP in the task, so just copy the IP given below.

143.110.250.149
email:   admin@notalive.in
discord: _i_am_innocent_
github:  github.com/notalive24