CFSS Internship Soc Analyst
CFSS Internship Soc Analyst
CFSS
*Theory
5.In a situation both open source and licensed software to get a job
done . What should be preferred and why ?
A Comparison of Open Source and Licenced Software
Introduction:
In today's digital landscape, organisations must decide whether to use
open source or licensed software for operational purposes.
1. Cost considerations:
- Open source: Lower initial cost, but may result in greater long-term
support and maintenance costs.
- Licenced software: A higher initial expenditure, but potentially a
cheaper total cost of ownership with time.
6.what are different levels of data classifications and why are they
required?
In cybersecurity, data classification entails categorising information
according to its sensitivity. Common classifications include:
1. 200 OK: The request was successful, and the server returned the
requested resource.
4. 400 Bad Request: The server is unable to process the request because
of incorrect syntax or missing arguments.
7.404 Not Found: The server could not find the requested resource.
8.405 Method Not Allowed: The requested resource does not support
the specified request method (GET, POST, PUT, DELETE, etc.).
These response codes are critical for both developers and users to
understand the results of their interactions with the web application.
10.The world has recently been hit by …... .Attack/Virus etc. what have
you done to protect your organisation as a security profissional?
As a security professional, I responded to the recent [Attack/Virus] by
taking various proactive steps to defend my organisation:
*PRACTICAL
3.From the pcap analysis, multiple open ports were detected as a result
of the attacker's activitie scan. Which of these ports provides access to
the web server admin panel?
4.Following the discovery of open ports on our server, it appears that the
attacker attempted to enumerate and uncover directories and files on our
web server. Which tools can you identify from the analysis that assisted
the attacker in this enumeration process?
6.Upon accessing the admin panel, the attacker made attempts to brute-
force the login credentials. From the data, can you identify the correct
username and password combination that the attacker successfully used
for authorization?
7.Once inside the admin panel, the attacker attempted to upload a file
with the intent of establishing a reverse shell can you identify the name
malicious file from the captured data?
8.Upon successfully establishing a reverse shell on our server, the
attacker aimed to ensure persistence on the compromised machine.
From the analysis, can you determine the specific command they are
scheduled to run to maintain their presence?
19. Attacker exfiltrated one file, what is the name of the tool
used for exfiltration?
A) Curl
20. Who is the other legitimate domain admin other than the
administrator?
A) adam
21. The attacker used the host discovery technique to know
how many hosts available in a certain network, what is the
network the hacker scanned from the host IP 1 to 30?
A) 192.168.20.0
8.Find the piece of code that uses an evasion technique. Analyse it,
what type of systems is it attempting to evade?
A) Virtual machine