Post

TryHackMe: Advent Of Cyber 2023 - Day 13

The proposed merger and suspicious activities have kept all teams busy and engaged. So that the Best Festival Company’s systems are safeguarded in the future against malicious attacks, McSkidy assigns The B Team, led by McHoneyBell, to research and investigate mitigation and proactive security.

The team’s efforts will be channelled into the company’s defensive security process. You are part of the team – a security researcher tasked with gathering information on defence and mitigation efforts.

Questions

Which security model is being used to analyse the breach and defence strategies?

  • Diamond Model

Which defence capability is used to actively search for signs of malicious activity?

  • Threat Hunting

What are our main two infrastructure focuses? (Answer format: answer1 and answer2)

  • firewall and honeypot

Which firewall command is used to block traffic?

  • deny

There is a flag in one of the stories. Can you find it?

  • THM{P0T$_W@11S_4_S@N7@}

If you enjoyed this task, feel free to check out the Network Device Hardening room.

  • No answer needed
This post is licensed under CC BY 4.0 by the author.