This repository contains incident response investigations completed during the TryHackMe SOC Level 1 Capstone.
Each investigation simulates a real-world security incident and requires analysis of:
- Network traffic (PCAP)
- Windows Event Logs
- Sysmon logs
- Malware artifacts
- Command execution
- Persistence mechanisms
The goal is to practice the workflow used by SOC Analysts and Incident Responders.
| Investigation | Description |
|---|---|
| Tempest Incident | Investigation of a phishing-based compromise involving malicious documents, C2 traffic, privilege escalation, and persistence |
- Network traffic analysis (Wireshark)
- Windows log analysis
- Sysmon investigation
- Malware identification
- Command & Control detection
- Privilege escalation analysis
- Persistence detection
- MITRE ATT&CK mapping
- Wireshark
- Event Viewer
- Sysmon
- VirusTotal
- CyberChef
- Windows Command Line
- PowerShell
SOC-Level-1-Capstone
│
├── Tempest
│ ├── README.md
│ └── Screenshots
│
└── README.md
Christopher Lee Cybersecurity Student – Purdue Global Aspiring SOC Analyst