π‘️ Incident Response Fundamentals – TryHackMe Write-Up
π‘️ Incident Response Fundamentals – TryHackMe Write-Up
Cyber security incidents are no longer rare events — they are part of everyday organizational risk. In this room, Incident Response Fundamentals, we explored how security teams detect, analyze, contain, and recover from cyber incidents using structured frameworks and practical techniques.
This blog summarizes everything covered in the room, including key concepts and the hands-on lab experience.
π Understanding Incidents
Every device generates thousands of events daily. These events are simply logged activities performed by users or processes.
However, when a security solution detects suspicious activity from these events, it triggers an alert.
Alerts can be:
-
False Positives – Suspicious but not actually harmful
-
True Positives – Confirmed malicious activity
When a true positive is validated and requires action, it becomes an Incident.
Incidents are prioritized based on severity:
-
Low
-
Medium
-
High
-
Critical
Severity depends on business impact.
π¨ Types of Security Incidents
Cyber incidents come in different forms. Each has a unique impact depending on the organization.
1️⃣ Malware Infection
Malicious software that damages systems or steals data. Often delivered via phishing attachments.
2️⃣ Security Breach
Unauthorized access to confidential information.
3️⃣ Data Leak
Sensitive data exposed, either intentionally or accidentally.
4️⃣ Insider Attack
Malicious activity performed by someone inside the organization.
5️⃣ Denial of Service (DoS)
Flooding a system with traffic to make it unavailable to legitimate users.
Each incident type requires different handling and response strategies.
π Incident Response Frameworks
Handling incidents without structure can lead to chaos. That’s why frameworks exist.
π‘️ SANS Incident Response (PICERL)
SANS uses six phases:
-
Preparation
-
Identification
-
Containment
-
Eradication
-
Recovery
-
Lessons Learned
PICERL is an easy way to remember them.
π️ NIST Incident Response Framework
NIST simplifies the lifecycle into four phases:
-
Preparation
-
Detection & Analysis
-
Containment, Eradication & Recovery
-
Post-Incident Activity
The main difference is that NIST merges some of the SANS stages.
π ️ Incident Detection & Response Tools
Modern incident response relies heavily on security tools:
πΉ SIEM (Security Information and Event Management)
-
Collects logs centrally
-
Correlates events
-
Generates alerts
πΉ Antivirus (AV)
-
Detects known malware
-
Performs routine scans
πΉ EDR (Endpoint Detection & Response)
-
Installed on endpoints
-
Detects advanced threats
-
Can contain and eradicate threats
π Playbooks vs Runbooks
To ensure consistent response:
-
Playbooks → High-level structured guidelines for handling specific incidents
-
Runbooks → Detailed technical step-by-step execution procedures
Playbooks save time and reduce decision-making stress during real incidents.
π§ͺ Lab Work: Phishing Incident Investigation
In the hands-on lab, we simulated a phishing attack where a malicious email was sent to multiple employees.
π Investigation Steps
-
Identify the malicious email sender
-
Determine the threat vector
-
Check how many hosts downloaded the attachment
-
Identify how many executed it
-
Analyze timeline events
-
Complete containment and investigation
π₯️ Key Findings
-
The phishing email successfully reached multiple users
-
Several hosts downloaded the attachment
-
Only one system executed the malware
-
The infected machine was analyzed through its event timeline
This lab demonstrated real-world SOC analyst responsibilities:
-
Incident scoping
-
Host analysis
-
Containment decisions
-
Evidence review
π― Conclusion
This room provided a strong foundation in Incident Response by combining theory with practical implementation.
We learned:
-
How events become incidents
-
Types of cyber incidents
-
SANS and NIST response frameworks
-
The role of SIEM, AV, and EDR
-
The importance of playbooks
-
Practical phishing incident investigation
Incident Response is not just about reacting — it’s about structured, intelligent handling of security threats to minimize business impact.
This room successfully introduced the mindset and workflow of a Blue Team professional.
π© Flags
THM{My_First_Incident_Response}



Comments
Post a Comment