-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Effective Threat Investigation for SOC Analysts
By :

There are a number of text conventions used throughout this book.
Code in text
: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: “In this case, the user executed a malicious Microsoft Word document named RS4_WinATP-Intro-Invoice(9).dotm
, which spawned the PowerShell.exe
process to download the stage two malware file named Win-ATP-Intro-Backdoor.exe
.”
A block of code is set as follows:
A new process has been created.
Creator Subject:
Security ID: S-1-5-21-2431329721-3629005211-3263396425-1105
Account Name: mostafa.yahia
Account Domain: soc
Logon ID: 0x89553D
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
SELECT username,password FROM users WHERE username='' or 1=1; --' and password='';
Any command-line input or output is written as follows:
SELECT username,password FROM users WHERE username='Mostafa' and password='123456';
Bold: Indicates a new term, an important word, or words that you see onscreen. For instance, words in menus or dialog boxes appear in bold. Here is an example: “The second section is the Object section, which consists of the Object Server field and is always Security.”
Tips or important notes
Appear like this.
Change the font size
Change margin width
Change background colour