[Day 13] Intrusion detection To the Pots, Through the Walls

Which security model is being used to analyse the breach and defence strategies?

diamond model

Which defence capability is used to actively search for signs of malicious activity?

Threat hunting

What are our main two infrastructure focuses? (Answer format: answer1 and answer2)

firewall and honeypot

Which firewall command is used to block traffic?

deny

There is a flag in one of the stories. Can you find it?

THM{P0T$_W@11S_4_S@N7@}