SOC Analyst
SOC Analyst
Cyber Attacks
Mitigation
Cyber Attacks AND how mitigation
Mitigation:
• Encourage users to use complex passwords
• Lockout accounts after few attempts
• Use Captcha to slow down brute-force
• Use multifactor authentication
Mitigation:
• Advise users not to keep a simple word or easily identifiable
• information as password.
• Encourage users to use complex passwords
• Lockout accounts after few attempts
• Use Captcha to slow down brute-force
• Use multifactor authentication
Mitigation:
• Rainbow table attacks can easily be prevented by using salt
• techniques,
• Salt is a random data that is passed into the hash function along
• with the plain text.
• Lockout accounts after few attempts
• Use Captcha to slow down brute-force
• Use multifactor authentication
Mitigation:
• Restrict and protect high privileged domain accounts
• This mitigation reduces the risk of administrators from inadvertently
exposing
• privileged credentials to higher risk computers.
• Restrict and protect local accounts with administrative privileges
• This mitigation restricts the ability of attackers to use administrative local
• accounts for lateral movement PtH attacks.
• Restrict inbound traffic using the Windows Firewall
• This mitigation restricts attackers initiating lateral movement from a
• compromised workstation by blocking inbound connections on all other
• workstations with the local Windows Firewall.
Mitigation:
• Use Firewall and IPS
• OS Hardening
• Use honeypots to detect scanning activities
Mitigation:
• Avoid using insecure protocols (like HTTP, FTP, telnet etc.
• and use secured versions like HTTPS, SFTP, SSH etc.)
• Use encryption whenever possible for data transmission.
Mitigation:
• Use Email Security Solutions (to block obvious phishing and spam emails)
• Educate users
• Use DMARC (Domain-based Message Authentication, Reporting and
• Conformance)
• DMARC is a standard for verifying the authenticity of an email. It offers
email
• receivers a way to verify if a message is really from a authorized sender or
not.
How Investigation
✍ https://lnkd.in/dfscKs4n
✍ https://lnkd.in/dSMs5Tqx
✍ https://lnkd.in/d5sXYis3
✍ https://lnkd.in/d3VS3trE
Explain Whaling.
Whaling is a type of phishing that targets senior
management/leadership teams/important individuals at an
organization
Explain Vishing.
Vishing works similar to phishing, instead of sending and email, the
attacker tricks the target to give critical/sensitive information over
phone call
Mitigation:
Mitigation:
Mitigation:
Mitigation:
• Use Static ARP
• Detect ARP poisoning using tools like XARP
• Set up Packet filtering
• Install AV and keep signatures updated
Mitigation:
Mitigation:
• Regularly audit DNS Zones
• Keeping DNS Servers up-to-date.
• Restrict Zone Transfers
• Limit recursive queries.
• Store only data related to the requested domain.
Mitigation:
• IPS Systems can help detect few DNS Tunneling attacks
• Block communication to IPs that are known to be used for data
• exfiltration
• Use DNS firewall
• Deploy standalone DNS protection solution (Like Infoblox)
Mitigation:
• Encourage users to keep their software up to date
• Install AV that is capable of scanning internet traffic
• Install web-filtering software.
• Restrict add-ons on browsers.
• Educate users not to visit untrusted websites.
Mitigation:
• Use AV with up-to-date signature
• Use Ad-blockers
• Educate users not to download files from unknown sources
Botnets: Botnets are networks of infected computers that are made to work
together under the control of an attacker.
RAT: Remote Access Trojan – Type of malware that allows an attacker gain
unauthorized remote access of victim’s machine
Worm?
Virus: Viruses attach themselves to clean files and infect other clean
files. A user action (like execution) is required for the virus to run.
Mitigation:
• Use EDR tools to monitor and detect suspicious activities.
• Disable command line shell scripting language, including PowerShell and
• Window Management instrumentation, wherever it's not needed
Mitigation:
• Input validation
• Sanitize all inputs (like remove quotes and special characters)
• Use IPS and WAF solutions
• Turn off visibility of Database errors on production servers
Mitigation:
• Input validation
• Sanitize all inputs (like remove quotes and special characters)
• Encode data on output.
Mitigation:
• Synchronizer token pattern
• Cookie-to-header token
• Double Submit Cookie
Mitigation:
Where possible, implement multi-factor authentication to prevent automated,
credential stuffing, brute force, and stolen credential re-use attacks.
Do not ship or deploy with any default credentials, particularly for admin users.
Implement weak-password checks, such as testing new or changed passwords
against a list of the top 10000 worst passwords.
Lock user accounts after certain failed attempts
Mitigation: