Posts

Showing posts from April, 2022

Phishing Mail Investigation

  Phishing investigation Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.   In SIEM investigation. Phishing mails reports us 1. Customers 2. Employees or 3. We get alert In SIEM tool.   The investigation following Firstly we requested to employee or customers to send saved email. Once we receive mail à We have to save mail   Go to properties. Copy the complete in Internet Header information Then we have Threat Intelligence tool Mx tool Box open In Header Analyzer   Then Paste   In Header analyzer part.. Need to check Following point   1. SPF : sender policy   Framework   Find the Original Sender ip address then check reputation of this from various Thr...

Cyber Security Interview Questions

what are the log sources you integrated with siem tool what is dos, ddos difference b/n dos & ddos  if you dont have rule condition how you will identify ddos attack what is tcp & udp and difference explain bruteforce attack and how you will investigate  ssh telnet and dns port numbers what is the use of arp Port scanning investigation Malware investigation DDOS INVESTIGATION SQL injection Suspicious outbound connection happened wt will you see for mitigation Owasp top 10 What is threat management In mitre attack on persistence technique tell me any two subtechniques Sentinel architecture How vulnerability will come in edr? Bruteforce investigation Evenid 4791,4624,4625,4688 Port number RDP,LDAP,telnet,ssh,amb ell me about the investigation in DLP? 2. On what basis DLP tool creates a alert? 3. How are u gonna report about forensics in DLP? 4. Difference between EDR and AV? 5. Explain any two alerts investigation in SIEM? 6. Why do u use comm. prompt during malware inve...

cyber Security Road Map

 Introduction of cyber security 8 Types of Cyber Security Attacks, And Their Prevention Principles of  security Classification of Cyber crimes Reasons for Commission of Cyber Crimes Hackers & Types of Hackers How To prevent hacking TOP CYBER ATTACKS Virus & Worms  I N T R O D U C T I O N TO C O M P U T E R VIRUS Types of computer viruses Top 5 Sources of Computer Virus Attack Best antivirus software. introduction to WORMS Difference between viruses and worms. Networking Types of Networks What is osi model & tcp/ip model ? Network Addresses Domain Name System ports & protocols Ip Addressing Tcp 3 way handshake Ssl protocol & SSL Handshake Http & https Cryptographym & its types Encryption & descryption cyberkill chain methodology WINDOWS NETWORK & COMMANDS Firewalls & its types Introduction to dns system data loss prevention Antivirus & its types Ids/ips & its types Proxy & vpn Investigations on various attacks(malware,bru...