Posts

Phishing Mail Investigation

  Phishing investigation Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.   In SIEM investigation. Phishing mails reports us 1. Customers 2. Employees or 3. We get alert In SIEM tool.   The investigation following Firstly we requested to employee or customers to send saved email. Once we receive mail à We have to save mail   Go to properties. Copy the complete in Internet Header information Then we have Threat Intelligence tool Mx tool Box open In Header Analyzer   Then Paste   In Header analyzer part.. Need to check Following point   1. SPF : sender policy   Framework   Find the Original Sender ip address then check reputation of this from various Thr...

Cyber Security Interview Questions

what are the log sources you integrated with siem tool what is dos, ddos difference b/n dos & ddos  if you dont have rule condition how you will identify ddos attack what is tcp & udp and difference explain bruteforce attack and how you will investigate  ssh telnet and dns port numbers what is the use of arp Port scanning investigation Malware investigation DDOS INVESTIGATION SQL injection Suspicious outbound connection happened wt will you see for mitigation Owasp top 10 What is threat management In mitre attack on persistence technique tell me any two subtechniques Sentinel architecture How vulnerability will come in edr? Bruteforce investigation Evenid 4791,4624,4625,4688 Port number RDP,LDAP,telnet,ssh,amb ell me about the investigation in DLP? 2. On what basis DLP tool creates a alert? 3. How are u gonna report about forensics in DLP? 4. Difference between EDR and AV? 5. Explain any two alerts investigation in SIEM? 6. Why do u use comm. prompt during malware inve...

cyber Security Road Map

 Introduction of cyber security 8 Types of Cyber Security Attacks, And Their Prevention Principles of  security Classification of Cyber crimes Reasons for Commission of Cyber Crimes Hackers & Types of Hackers How To prevent hacking TOP CYBER ATTACKS Virus & Worms  I N T R O D U C T I O N TO C O M P U T E R VIRUS Types of computer viruses Top 5 Sources of Computer Virus Attack Best antivirus software. introduction to WORMS Difference between viruses and worms. Networking Types of Networks What is osi model & tcp/ip model ? Network Addresses Domain Name System ports & protocols Ip Addressing Tcp 3 way handshake Ssl protocol & SSL Handshake Http & https Cryptographym & its types Encryption & descryption cyberkill chain methodology WINDOWS NETWORK & COMMANDS Firewalls & its types Introduction to dns system data loss prevention Antivirus & its types Ids/ips & its types Proxy & vpn Investigations on various attacks(malware,bru...

PAYTM CYBER SECURITY INTERVIEW QUESTIONS

  What are the tools using? What is edr? What is difference between   vpn & proxy? Telenet port num & ssh port number port number for rdp What is golden ticket? Owasp top 10 vulnerabiluties Ssl handshake After ransomware came into system before encrypting attacker will do some things . what is that? What is logon number for rdp What is cyber kill chain? Can u give the example of what is the ways to delivery and explain What is mitm What is XSS ? how to prevent cross site scripting?   How do you know u r using proper sanitization? What is fileless malware & file malware? A)fileless malware is a type of malicious software that  uses legitimate programs to infect a computer . It does not rely on files and leaves no footprint, making it challenging to detect and remove. If we checked av no suspicious logs.but cnc connection happened . how to detect that. What will u see in the proxy logs?  A) Date and time. ·  ...

Brute force attack investigation

  Responsibility Index Phase Responsibility      Identification L1 Analyst:- GSOC Monitoring Team      Investigation  L2 Analyst:-This includes individuals from Network Team/GSOC Containment L2 Analyst: -  This includes individuals from Network Team/ Server team          Remediation L2 Analyst:-This includes Network Team/Server Team/GSOC Recovery L2 Analyst:-This includes Network Team/Server Team/GSOC Brute Force attack Procedure Identification Stage Stage Source Identification Brute Force incident is reported by  Network Team Incident/If the alert is raised by the SIEM Investigating Stage Stage Actions by Respective Team Investigation Security team checks If the Brute Force attack is identified and an alert generated via SIEM below parameters are considered for investigating: Source addresses of the attempts Firewall Action Investigating Destination on which brute force attem...