TITLE
Short summary of the post.
#Testing one twoโฆ
This is the testing Post
Size reduced but title
Quisque egestas convallis ipsum, ut sollicitudin risus tincidunt a. Maecenas interdum malesuada egestas. Duis consectetur porta risus, sit amet vulputate urna facilisis ac. Phasellus semper dui non purus ultrices sodales.
Overall, the timeline should contain the information described in the following columns:
| Date | Time of the event | hostname | event description | data source |
|---|---|---|---|---|
| 09/09/2021 | 13:31 CET | SQLServer01 | Hacker tool โMimikatzโ was detected | Antivirus Software |
Want to be a true investigator? ๐ต๏ธโโ๏ธ
Always ask yourself: - **Who** did it? - **What** happened? - **When** did it occur? - **Where** did it take place? - **Why** did it happen? - **How** was it executed? These answers will turn your notes into a powerful tool! ๐๐ ๏ธ Incident Report
| ๐ Field | ๐ Description |
|---|---|
| Incident ID | INC-YYYYMMDD-001 (Format for unique ID) |
| Date & Time | YYYY-MM-DD HH:MM:SS |
| Reported By | Name of the person who reported the incident |
| Affected System(s) | List of affected systems (Hostname, IP, etc.) |
| Severity Level | ๐น Low ๐ธ Medium ๐ฅ High ๐ Critical |
| Incident Type | (e.g., Phishing, Malware, DoS, Data Breach, etc.) |
| Short Description | Brief summary of the incident |
| Detailed Description | What exactly happened? Include all relevant details |
| Initial Indicators | How was the incident detected? (e.g., logs, user report, IDS/IPS alert) |
| Actions Taken | Step-by-step actions that have been taken so far |
| Root Cause | If known, what caused the incident? |
| Impact Analysis | What was the impact of the incident (data loss, downtime, etc.)? |
| Mitigation Steps | What immediate measures were taken to mitigate the impact? |
| Lessons Learned | What can be improved to prevent similar incidents in the future? |
| Next Steps | What additional actions are required? |
| Incident Status | ๐ข Resolved / ๐ก Ongoing / ๐ด Escalated |
| Handled By | Who worked on resolving the incident? |
| Evidence Collected | Hashes, screenshots, logs, artifacts, disk images |
| References | Links to playbooks, documentation, or relevant resources |
Tools (software && Hardware)
Moving forward, we also need to ensure that we have the right tools to perform the job. These include, but are not limited to:
- Additional laptop or a
- Digital forensic image acquisition and analysis tools
- Memory capture and analysis tools
- Live response capture and analysis
- Log analysis tools
- Network capture and analysis tools
- Network cables and switches
Example line for prompt.
Example line for prompt.
Example line for prompt.
Example line for prompt.
This is inline code: while (choice != '5'); have you seen.
1
2
3
4
5
6
7
public:
Book() {}
Book(string id, string title, string author, int publisherYear)
: id(id), title(title), author(author), publisherYear(publisherYear) {}
virtual void toString() const = 0;
};
1
2
3
{% if product.title contains 'Pack' %}
This product's title contains the word Pack.
{% endif %}
Can be referenced as \eqref{eq:label_name}.
โLorem ipsum dolor sit amet, \(LaTeX_math_expression\) consectetur adipiscing elit.โ
- \(LaTeX_math_expression\)
- \(LaTeX_math_expression\)
- \(LaTeX_math_expression\)
