Markdown Snippet Reference
2024-01-102 min read316 words
guides
markdown
snippets
renderer
Markdown Snippet Reference
Dokumen ini menampilkan contoh-contoh snippet yang sekarang didukung renderer.
1. Code Fence Standar
CODESystem check complete. No anomalies detected.
2. Code Fence dengan Bahasa
BASH#!/bin/bash
echo "Scanning endpoints..."
PYTHONdef classify_alert(event):
if event.severity >= 8:
return "CRITICAL"
return "NORMAL"
3. Code Fence Gaya Obsidian
BASHps aux | grep suspicious_process
CODE[ALERT] Unknown activity detected. Initiating investigation sequence.
4. Code Fence dengan Metadata
Incident Metadataincident:
id: IR-2025-007
owner: soc-team
status: active
severity: high
Query: recent loginsSELECT username, source_ip, login_time
FROM audit_logins
WHERE login_time > NOW() - INTERVAL '1 day';
5. Callout Blocks
Data ingested from sensors is enriched and scored.
Unusual lateral movement detected across segmented networks.
Build hypotheses menggunakan MITRE ATT&CK dan validasi dengan telemetry.
Containment harus dimulai dalam 15 menit.
6. Inline Code
Jalankan pemindaian dengan
CODE
python run_scan.py --mode=deep7. Tabel Berisi Code
| Tool | Perintah | Tujuan |
|---|---|---|
| netstat | `netstat -anp | grep 443` |
| lsof | CODE | Menemukan PID yang aktif |
| nmap | CODE | Probing exposure |
8. Contoh Campuran
- Host:
CODEworkstation-33- Trigger: EDR alert
- Artefak: memory dump, process tree
Collection ScriptGet-Process | Where-Object {$_.Id -eq $env:PID} Get-WinEvent -LogName Security -MaxEvents 25
9. Link dalam Code Block
TEXTRefer to runbook: https://intranet.secops.local/runbooks/incident-response
10. Callout dengan List
- Disable affected accounts.
- Isolasi sistem terdampak.
- Deploy aturan deteksi terbaru.