Post

TITLE

Short summary of the post.

TITLE

#Testing one twoโ€ฆ

This is the testing Post

Size reduced but title

Quisque egestas convallis ipsum, ut sollicitudin risus tincidunt a. Maecenas interdum malesuada egestas. Duis consectetur porta risus, sit amet vulputate urna facilisis ac. Phasellus semper dui non purus ultrices sodales.

Overall, the timeline should contain the information described in the following columns:

DateTime of the eventhostnameevent descriptiondata source
09/09/202113:31 CETSQLServer01Hacker tool โ€˜Mimikatzโ€™ was detectedAntivirus Software
Want to be a true investigator? ๐Ÿ•ต๏ธโ€โ™‚๏ธ Always ask yourself: - **Who** did it? - **What** happened? - **When** did it occur? - **Where** did it take place? - **Why** did it happen? - **How** was it executed? These answers will turn your notes into a powerful tool! ๐Ÿš€

๐Ÿ› ๏ธ Incident Report

๐Ÿ” Field๐Ÿ“ Description
Incident IDINC-YYYYMMDD-001 (Format for unique ID)
Date & TimeYYYY-MM-DD HH:MM:SS
Reported ByName of the person who reported the incident
Affected System(s)List of affected systems (Hostname, IP, etc.)
Severity Level๐Ÿ”น Low ๐Ÿ”ธ Medium ๐Ÿ”ฅ High ๐Ÿ’€ Critical
Incident Type(e.g., Phishing, Malware, DoS, Data Breach, etc.)
Short DescriptionBrief summary of the incident
Detailed DescriptionWhat exactly happened? Include all relevant details
Initial IndicatorsHow was the incident detected? (e.g., logs, user report, IDS/IPS alert)
Actions TakenStep-by-step actions that have been taken so far
Root CauseIf known, what caused the incident?
Impact AnalysisWhat was the impact of the incident (data loss, downtime, etc.)?
Mitigation StepsWhat immediate measures were taken to mitigate the impact?
Lessons LearnedWhat can be improved to prevent similar incidents in the future?
Next StepsWhat additional actions are required?
Incident Status๐ŸŸข Resolved / ๐ŸŸก Ongoing / ๐Ÿ”ด Escalated
Handled ByWho worked on resolving the incident?
Evidence CollectedHashes, screenshots, logs, artifacts, disk images
ReferencesLinks to playbooks, documentation, or relevant resources

Tools (software && Hardware)

Moving forward, we also need to ensure that we have the right tools to perform the job. These include, but are not limited to:

  • Additional laptop or a
  • Digital forensic image acquisition and analysis tools
  • Memory capture and analysis tools
  • Live response capture and analysis
  • Log analysis tools
  • Network capture and analysis tools
  • Network cables and switches

Desktop View This is from kenya!

Desktop View smaller

Example line for prompt.

Example line for prompt.

Example line for prompt.

Example line for prompt.

This is inline code: while (choice != '5'); have you seen.

1
2
3
4
5
6
7
public:
    Book() {}
    Book(string id, string title, string author, int publisherYear)
        : id(id), title(title), author(author), publisherYear(publisherYear) {}

    virtual void toString() const = 0;
};
1
2
3
{% if product.title contains 'Pack' %}
  This product's title contains the word Pack.
{% endif %}
\[LaTeX_math_expression\] \[\begin{equation} LaTeX_math_expression \label{eq:label_name} \end{equation}\]

Can be referenced as \eqref{eq:label_name}.

โ€œLorem ipsum dolor sit amet, \(LaTeX_math_expression\) consectetur adipiscing elit.โ€

  1. \(LaTeX_math_expression\)
  2. \(LaTeX_math_expression\)
  3. \(LaTeX_math_expression\)
This post is licensed under CC BY 4.0 by the author.