To access material, start machines and answer questions login.
Think like a Defender
Defensive security is the process of defending and securing devices and systems.
Before you can defend a system, you need to understand what defenders are responsible for. Defensive security focuses on detecting and investigating attacks, and responding before damage occurs.
Unlike offensive security, you do not attack systems, instead, you monitor and protect them.
What is the main goal of defensive security?
- Detect and respond to attacks
- Attack systems to find flaws
Detect Suspicious Activity
The first step in defensive security is spotting activity that doesn't look normal. This activity is stored in pieces of information known as alerts.
You'll need to...
Why you're doing this
Defenders use tools similar to this monitoring dashboard to decide what activity needs investigating.
Which source IP address is generating the suspicious traffic?
Identify the Attack
Once suspicious activity is determined, defenders need to understand what kind of attack it is.
You'll need to...
Why you're doing this
The monitoring dashboard shows what the attacker is trying to find. We can use this information to better secure our systems, stop the attacker and prevent this attack from occuring again.
Copy the latest URL that the attacker has tried to find and paste it below.
Stop the Attack
Now that the attack has been identified, defenders can take steps to stop it.
You'll need to...
Why you're doing this
We can stop the attacker from continuing on immediately while we investigate and fix any security vulnerabilities. This is known as containment.
When the success message apears, copy the flag and paste it below.
Ready to learn Cyber Security? Create your free account today!
TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.
Already have an account? Log in
