In this simulated Security Operations Center (SOC) investigation, I identified and analyzed a Classic (In-band) SQL Injection attempt against a web application. Using security monitoring tools, log analysis, threat intelligence platforms, and SOC workflows, I:

•Detected suspicious HTTP requests containing SQLi payloads
•Noted response size anomalies indicating the start of the exploitation attempt
•Classified the attack type and investigated the source IP reputation
•Checked endpoints and email systems for related compromise indicators
•Confirmed the attack was unsuccessful and documented findings for future detection tuning


This project highlights my ability to perform threat detection, log analysis, and incident documentation in a SOC environment.