SOC analysts – Threat assessment using FAIR methodology

You can choose 1 of the following topics:China Chopper Scans
Peppa Pig Scans
Port 3389
Port 9530
C99 Web Shell
Petya and PetyaWrap
Wicked (Mirai Variant)
Miori (Mirai Variant)
Assuming you have chosen one of the above topics, do the following:You are currently working in a research wing for a standard SOC (Security Operations Center).

The SOC keeps analytics on the current trends within the network.Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems.

Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed.

This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify;Your deliverable will be a 5 page APA style research report with your findings (excluding title and reference pages).

Discover current attacks being performed through this port, or current state of a known scanning suite.Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code.

List known services on the affected ports … Read the rest

The post SOC analysts – Threat assessment using FAIR methodology appeared first on Tedext.


Don`t copy text!
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?