You can choose 1 of the following topics:China Chopper Scans
Peppa Pig Scans
C99 Web Shell
Petya and PetyaWrap
Wicked (Mirai Variant)
Miori (Mirai Variant)
Assuming you have chosen one of the above topics, do the following:You are currently working in a research wing for a standard SOC (Security Operations Center).
The SOC keeps analytics on the current trends within the network.Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems.
Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed.
This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify;Your deliverable will be a 5 page APA style research report with your findings (excluding title and reference pages).
Discover current attacks being performed through this port, or current state of a known scanning suite.Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code.
List known services on the affected ports … Read the rest
The post SOC analysts – Threat assessment using FAIR methodology appeared first on Tedext.