TryHackMe (THM) - SOC Fundamentals
TryHackMe SOC Fundamentals Walkthrough
The SOC Fundamentals room introduces us to the core concepts of a Security Operations Center (SOC). It explains the responsibilities of a SOC team, its processes, and the technologies it uses to protect an organization from cyber threats.
Check out the room here: https://tryhackme.com/r/room/socfundamentals
Expectations:
Learn what a SOC is and its importance in cybersecurity.
Understand the three pillars of SOC: People, Processes, and Technology.
Gain practical experience analyzing security incidents using an SIEM tool.
Complete quizzes and tasks to reinforce learning.
Task 1: Introduction to SOC
This task explains the concept of a SOC. A SOC is a facility where a dedicated security team works 24/7 to monitor and protect an organization’s IT environment.
Key Points:
SOC teams prevent damage by identifying and responding to suspicious activities.
Modern SOCs focus on detection and response rather than relying solely on traditional security practices.
Quiz Answers:
- What does SOC stand for?
Security Operations Center
Task 2: Purpose and Components
This task focuses on how SOCs maintain detection and response to prevent security incidents. It introduces core SOC activities such as:
Detecting vulnerabilities, unauthorized activity, policy violations, and intrusions.
Supporting incident response to minimize impact and find root causes.
Key Concept: The three pillars of SOC are People, Processes, and Technology.
Quiz Answers:
The SOC team discovers an unauthorized user is trying to log in. What capability is this?
Detection
What are the three pillars of SOC?
People, Process, Technology
Task 3: People
This task highlights the hierarchy and responsibilities of SOC team members.
Roles in a SOC team:
SOC Analyst (Level 1): First responders who triage alerts.
SOC Analyst (Level 2): Perform deeper investigations and correlate data.
SOC Analyst (Level 3): Proactively hunt threats and assist in incident response.
Security Engineer: Deploy and configure security solutions.
Detection Engineer: Create rules for detecting malicious activity.
SOC Manager: Manage processes and update the organization’s leadership.
Quiz Answers:
Alert triage and reporting is the responsibility of?
SOC Analyst (Level 1)
Which role is responsible for establishing detection rules?
Detection Engineer
Task 4: Process
This task discusses critical SOC processes, including:
Alert Triage: Analyze and prioritize alerts using the 5 Ws: What, When, Where, Who, Why.
Reporting: Escalate harmful alerts through detailed tickets with evidence.
Incident Response and Forensics: Handle critical security incidents and investigate their root causes.
Example:
An alert of malware detected on GEORGE PC might look like this:
What? Malicious file detected.
When? June 5, 2024, at 13:20.
Where? Directory on GEORGE PC.
Who? User George.
Why? The user downloaded pirated software.
Quiz Answers:
If John attempted to steal system data, which ‘W’ does this answer?
Who
The SOC team detects a large data exfiltration. Which ‘W’ is this?
What
Task 5: Technology
Technology is the backbone of a SOC. It enables teams to centralize monitoring and automate responses to security threats.
Key Tools:
SIEM (Security Information and Event Management): Collects and correlates logs to identify suspicious activity.
EDR (Endpoint Detection and Response): Provides visibility into endpoint activities and automates responses.
Firewall: Monitors and filters incoming/outgoing traffic to prevent unauthorized access.
Quiz Answers:
Which security solution monitors network traffic?
Firewall
Do SIEM solutions focus on detecting and alerting about security incidents?
Yes
Task 6: Practical Exercise of SOC
This task provides a hands-on scenario simulating the responsibilities of a Level 1 SOC Analyst. You’ll analyze logs in an SIEM tool to answer the 5 Ws for a port scanning alert.
Quiz Answers:
What: Activity that triggered the alert?
port scan
When: Time of the activity?
June 12, 2024 17:24
Where: Destination host IP?
10.0.0.3
Who: Source host name?
Nessus
Why: Reason for the activity? Intended/Malicious
Intended
Additional Investigation Notes: Has any response been sent back to the port scanner IP? (yea/nay)
yea
What is the flag found after closing the alert?
Scenario:
What? Port Scan
When? June 12, 2024, 17:24
Where? Destination host IP: 10.0.0.3
Who? Source host name: Nessus
Why? Intended activity
Task 7: Conclusion
This room illuminates the foundational skills required to work in a SOC environment. Key Takeaways:
SOC teams detect, investigate, and respond to incidents to protect organizational assets.
Effective communication and collaboration between People, Process, and Technology are essential.
Hands-on exercises simulate real-world scenarios, enhancing understanding.
Thank you for reading my article. Please leave any questions or comments. We can also connect more on LinkedIn or X.