LetsDefend Practice Solution
LetsDefend Practice Solution
Begin by logging into the LetsDefend Portal and navigating to the Investigation channel.
This is where active alerts are presented for review and action by the SOC team.
Click on the alert to expand and examine its metadata and context. It’s important to
take a careful look at all available fields before proceeding. During this phase, you'll
want to collect several key pieces of evidence that may be crucial for further
investigation or escalation.
Make sure to document the following details from the alert panel:
To validate the threat, it’s important to check the reputation of any external IP
addresses involved in the alert.
Here are some trusted open-source Threat Intelligence (TI) platforms to use:
• VirusTotal – Aggregate of multiple AV engines and reputation scores.
If your initial investigation confirms the alert as a True Positive, the next step is to
escalate it for full incident response.
1. In the Investigation view, locate the Attack Type column for the alert.
3. This action converts the alert into a case and links it to the appropriate playbook
for further steps.
This process ensures the alert is now tracked as a formal incident, with workflows and
containment/remediation tasks assigned.
• The ability to collaborate with team members inside the case dashboard.
The first step in the playbook is to understand the specific rule that triggered the
alert, including:
• Protocol Used: Identified via logs (typically HTTP/HTTPS for web-based attacks)
Note: Navigate to Log Management and search using either the source IP or
destination IP to view the full event context and request payloads.
7. Identify IP and Device Ownership.
Understanding who owns the source and destination devices is critical in validating the
scope and impact of the alert.
• Check ownership of the IP (e.g., is it from a VPS, web hosting, or proxy provider?)
o VirusTotal
o AbuseIPDB
o Cisco Talos
In our case:
➔ If Destination Is Internal:
• Go to Endpoint Security
• Collect:
o Hostname: WebServer100
• Most events returned HTTP response code 500, indicating the server rejected the
request.
• One event returned 200, but analyzing the overall pattern confirms the attack
attempt failed.
This is a common behavior when input validation or security controls block malformed
or malicious requests.
➔ Question Answer
a. Is Traffic Malicious? Yes (SQL code in decoded URL)
b. What Is the Attack Type? SQL Injection
c. Was this part of a planned test? No
d. What Is the Direction of Traffic? Internet ➝ Company Network
e. Was the Attack Successful? No (Rejected with HTTP 500)
f. Is Tier 2 Escalation Required? No
External attacker 167.99.19.17, a known malicious IP, attempted to exploit the internal
web server (WebServer100) by injecting SQL code. The HTTP request method used was
GET, but the server denied the request with a 500-response code, indicating rejection.
No signs of successful exploitation were found."
Closing Summary:
This was a true positive alert involving an actual SQL injection attempt from an external
attacker. The source IP 167.99.19.17 is malicious and attempted to exploit an internal
web server. The attack was unsuccessful — confirmed via HTTP 500 response codes
and absence of suspicious activity on the host. No escalation is required. All related
logs indicate SQL injection attempts only.