THM Security Operations - grunt92/IT-Sec-WriteUps GitHub Wiki

Introduction to Security Operations

What does SOC stand for?

Security Operation Center

How many hours a day does the SOC monitor the network?

24

Elements of Security Operations

What does NSM stand for?

Network security monitoring

Practical Example of SOC

Add the necessary firewall rules to block the ongoing attack. What is the flag that you have received after successfully stopping the attack?

Select the IP of the Device sending red packets as the "Source IP", the server as the "Destination IP", Port 80 as the Port and "DROP" as Action and click the "Add Rule"-button. After a short while the traffic to the Destination will be reduced to a minimum and you get the flag.

THM{ATTACK_BLOCKED}