/root-abe

TryHackMe: Defensive Security Intro

task 1 - Introduction to Defensive Security

Defensive security is concerned with two main tasks:

  1. Preventing intrusions
  2. Detecting intrusions and responding properly

Blue teams are part of the defensive security landscape.

Some of the tasks that are related to defensive security include:

question

which team focuses on defensive security?

blue team


task 2 - areas of defensive security

in this task, we will cover the following:

Security Operations Center (SOC)

A Security Operations Center (SOC) is a team of cyber security professionals that watches a network and its systems to detect malicious events. Some of the areas of interest for a SOC are the following:

b5ac9a7b366ec258f9491899a9840f44

Threat Intelligence

ad86b4613e8c0f852ae88be79d5f056f

Digital Forensics and Incident Response (DFIR)

This section is about Digital Forensics and Incident (DFIR) and we will cover:

Digital Forensics

With the spread of all different types of computers a new branch of forensics was born, digital forensics or computer forensics.

In defensive security, the focus is on analyzing attacks and who did it. This includes:

Incident Response

An incident is typically when a data breach or attack happens but can also be a misconfiguration, intrusion attempt, or policy violation. Examples of a cyber attack include an attacker making our network or systems inaccessible, defacing (changing) the public website, and data breach (stealing company data). How would you respond to a cyber attack? Incident response specifies how to respond in each case. The goal is always to reduce damage and recover as soon as possible. Ideally, you would develop a plan that is ready for incident response.

The four major phases of the incident response process are:

  1. Preparation
  2. Detection and analysis
  3. Containment, Eradication, and Recovery
  4. Post-Incident Activity

b162600f5990f249d921aa0e8b7822f7

Malware Analysis

"Malware" is short for malicious software. Software is any programs, document, or files you can send over a network or save on a disk. Malware types include:

f07ff19c9f0ed7870127e98c6fe15cde

Malware analysis aims to learn about such malicious programs using various means:

  1. Static analysis works by inspecting the malicious program without running it. This usually requires solid knowledge of assembly language (the processor’s instruction set, i.e., the computer’s fundamental instructions).

  2. Dynamic analysis works by running the malware in a controlled environment and monitoring its activities. It lets you observe how the malware behaves when running.

questions

Q1. What would you call a team of cyber security professionals that monitors a network and its systems for malicious events?

Q2. What does DFIR stand for?

Q3. Which kind of malware requires the user to pay money to regain access to their files?


task 3 - practical example of defensive security

The Scenario

Let us pretend you are a Security Operations Center (SOC) analyst responsible for protecting a bank. This bank's SOC uses a Security Information and Event Management (SIEM) tool, which gathers security-related information and events from various sources and presents them in one dashboard. If the SIEM finds something suspicious, an alert will be generated.

63588b5ef586912c7d03c4f0-1715343494201

Not all alerts are malicious, however. It is up to the analyst to use their expertise in cyber security to investigate which ones are harmful.

For example, you may encounter an alert where a user has failed multiple login attempts. While suspicious, this kind of thing happens, especially if the user has forgotten their password and continues to try to log in.

Additionally, there might be alerts related to connections from unknown IP addresses. An IP address is like a home address for your computer on the Internet—it tells other computers where to send the information you request. When these addresses are unknown, it could mean that someone new is trying to connect or someone is attempting unauthorized access.

Click the View Site button

You will see this:

Screenshot from 2025-11-09 23-17-45

Select the one with IP address 143.110.250.149 in the alert log

Screenshot from 2025-11-09 23-21-48

Enter 143.110.250.149 here

Screenshot from 2025-11-09 23-22-42

Select to escalate this to Will Griffin

Screenshot from 2025-11-09 23-24-52

Enter 143.110.250.149 here to block it.

Screenshot from 2025-11-09 23-25-41

What is the flag that you obtained by following along?

THM{THREAT-BLOCKED}