Markdown Snippet Reference

2024-01-102 min read316 words
guides
markdown
snippets
renderer

Markdown Snippet Reference

Dokumen ini menampilkan contoh-contoh snippet yang sekarang didukung renderer.

1. Code Fence Standar

CODE
System check complete.
No anomalies detected.

2. Code Fence dengan Bahasa

BASH
#!/bin/bash
echo "Scanning endpoints..."
PYTHON
def classify_alert(event):
    if event.severity >= 8:
        return "CRITICAL"
    return "NORMAL"

3. Code Fence Gaya Obsidian

BASH
ps aux | grep suspicious_process
CODE
[ALERT] Unknown activity detected.
Initiating investigation sequence.

4. Code Fence dengan Metadata

Incident Metadata
incident:
  id: IR-2025-007
  owner: soc-team
  status: active
  severity: high
Query: recent logins
SELECT username, source_ip, login_time
FROM audit_logins
WHERE login_time > NOW() - INTERVAL '1 day';

5. Callout Blocks


Data ingested from sensors is enriched and scored.


Unusual lateral movement detected across segmented networks.


Build hypotheses menggunakan MITRE ATT&CK dan validasi dengan telemetry.


Containment harus dimulai dalam 15 menit.

6. Inline Code

Jalankan pemindaian dengan

CODE
python run_scan.py --mode=deep
lalu review report yang dihasilkan.

7. Tabel Berisi Code

ToolPerintahTujuan
netstat`netstat -anpgrep 443`
lsof
CODE
lsof -i :8080
Menemukan PID yang aktif
nmap
CODE
nmap -sV --script=vuln target.example
Probing exposure

8. Contoh Campuran

  • Host:
    CODE
    workstation-33
  • Trigger: EDR alert
  • Artefak: memory dump, process tree
Collection Script
Get-Process | Where-Object {$_.Id -eq $env:PID}
Get-WinEvent -LogName Security -MaxEvents 25
TEXT
Refer to runbook: https://intranet.secops.local/runbooks/incident-response

10. Callout dengan List

  1. Disable affected accounts.
  2. Isolasi sistem terdampak.
  3. Deploy aturan deteksi terbaru.

Related Notes

Rekomendasi berdasarkan kategori dan tag yang serupa.