When defenses fail — and eventually they do — incident response (IR) limits damage and restores operations. Today covers IR methodology, containment strategies, and designing networks that are resilient to breaches.
NIST SP 800-61 defines four phases: Preparation (policies, tools, contacts), Detection and Analysis (identify and confirm the incident), Containment, Eradication, and Recovery (stop the bleeding, remove malware, restore service), and Post-Incident Activity (lessons learned, improve defenses). Every organization should have a written IR plan tested annually with tabletop exercises.
Isolation prevents an attacker from pivoting further. Options: network isolation (firewall rule blocking the compromised host), VLAN reassignment (move the host to a quarantine VLAN), endpoint isolation (EDR one-click isolation), and shutdown (last resort — preserves volatile memory only if forensic image is taken first). Partial containment beats full shutdown when you want to monitor attacker behavior.
Design for breach: micro-segmentation limits lateral movement, privilege access workstations (PAWs) protect admin credentials, out-of-band management networks can't be reached from compromised hosts, immutable backups (3-2-1 rule) enable recovery from ransomware, and deception technologies (honeypots, canary tokens) detect attackers early.
# Quickly isolate a compromised Linux host
iptables -I INPUT 1 -j DROP
iptables -I OUTPUT 1 -j DROP
iptables -I INPUT 1 -s [ANALYST_IP] -j ACCEPT # Keep analyst access
# Capture volatile memory before shutdown
cd /tmp && wget https://github.com/504ensicsLabs/LiME/releases/
# Load LiME kernel module for RAM acquisition
insmod lime.ko 'path=/media/usb/ram.lime format=lime'
# Network IOC: block a C2 IP immediately
iptables -A OUTPUT -d [C2_IP] -j DROP
# Or DNS blackhole:
echo '[C2_IP] blocked.invalid' >> /etc/hosts
# Check for persistence (common locations)
crontab -l
ls /etc/cron.* /var/spool/cron/
cat /etc/rc.local
systemctl list-units --type=service | grep -v systemd
Using a malware PCAP and a sample memory dump from online repositories, perform a mini digital forensics investigation. Identify the infection vector, malware family, and IOCs. Write a 1-page incident report.