Cyber Defense Frameworks - TASK 3: A day In the life of a Junior (Associate) Security Analyst (Hands-on Lab)

There are many open-source databases out there like AbuseIPDB, Cisco Talos Intelligence, where you can perform a reputation and location check for the IP address. Most security analysts use these tools to aid them with alert investigations. You can also make the Internet safer by reporting the malicious IPs, for example, on AbuseIPDB

Question 1: What was the malicious IP address in the alerts?

Answer 1: 221.181.185.159

Question 2: To whom did you escalate the event associated with the malicious IP address?

Answer 2: Will Griffin

Question 3: After blocking the malicious IP address on the firewall, what message did the malicious actor leave for you?

Answer 3: THM{UNTIL-WE-MEET-AGAIN}

Comments

Popular Posts