Defensive Security: SOC Fundamentals (TryHackMe)

J3bitokJ3bitok
2 min read

In this article, I will write a write-up for SOC Fundamentals that covers Introduction to SOC, Purpose and Components, and People, Process, and Technology.

  1. What does the term SOC stand for? Security Operations Center

  2. The SOC team discovers an unauthorized user is trying to log in to an account. Which capability of SOC is this? Detection

  3. What are the three pillars of a SOC? People, Process, Technology

  4. Alert triage and reporting is the responsibility of? SOC Analyst (Level 1)

  5. Which role in the SOC team allows you to work dedicatedly on establishing rules for alerting security solutions? Detection Engineer

  6. At the end of the investigation, the SOC team found that John had attempted to steal the system's data. Which 'W' from the 5 Ws does this answer? Who

  7. The SOC team detected a large amount of data exfiltration. Which 'W' from the 5 Ws does this answer? What

  8. Which security solution monitors the incoming and outgoing traffic of the network? Firewall

  9. Do SIEM solutions primarily focus on detecting and alerting about security incidents? (yea/nay) yea

    This practical exercise uses People, Processes, and Technology and gives you a practical walkthrough of the role of a Level 1 Analyst in the SOC team.

    Click on the View Site button below to display the lab on the right side of the screen.

    View Site

    Scenario

    You are the Level 1 Analyst of your organization’s SOC team. You receive an alert that a port scanning activity has been observed on one of the hosts in the network. You have access to the SIEM solution, where you can see all the associated logs for this alert. You are tasked to view the logs individually and answer the question to the 5 Ws given below.

    Note: The vulnerability assessment team notified the SOC team that they were running a port scan activity inside the network from the host: 10.0.0.8

  10. What: Activity that triggered the alert? Port Scan

  11. When: Time of the activity? June 12, 2024 17:24

  12. Where: Destination host IP? 10.0.0.3

  13. Who: Source host name? Nessus

  14. Why: Reason for the activity? Intended/Malicious Intended

  15. Additional Investigation Notes: Has any response been sent back to the port scanner IP? (yea/nay) yea

  16. What is the flag found after closing the alert? THM{000_INTRO_TO_SOC}

Thank you for reading my article. Please leave any questions or comments on improving my learning journey and the THM challenges. We can also connect more on LinkedIn or X.

0
Subscribe to my newsletter

Read articles from J3bitok directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

J3bitok
J3bitok

Software Developer Learning Cloud and Cybersecurity Open for roles * If you're in the early stages of your career in software development (student or still looking for an entry-level role) and in need of mentorship you can book a session with me on Mentorlst.com.