Advent Of Cyber 2023 — Day 13
Dec 13, 2023
Which security model is being used to analyse the breach and defence strategies?
diamond model
Which defence capability is used to actively search for signs of malicious activity?
threat hunting
What are our main two infrastructure focuses? (Answer format: answer1 and answer2)
firewall and honeypot
Which firewall command is used to block traffic?
deny
There is a flag in one of the stories. Can you find it?
THM{P0T$_W@11S_4_S@N7@}
That’s it | Visit mansoorbarri.com for other hacking & IT related articles.