SlideShare a Scribd company logo
6
Most read
10
Most read
17
Most read
Getting Started with
Threat Hunting
Agenda
● What is Threat Hunting?
● Becoming the Threat Hunter
● Hypothesis Generation
● Useful Frameworks
● Example Hunts
● Free and Open Source Tools to Assist in Hunts
● Further Learning Resources
The Rise of Yet Another Buzzword
2016-2017ish - Threat Hunting
started making buzz
https://www.outlookmarketingsrv.com/the-buzzword-epidemic-is-your-content-infected/
What is Threat Hunting?
Human Led (and assisted by tools) practice of searching
iteratively through data to detect advanced threats that
evade traditional security controls
(Sqrrl and Me)
What is Threat Hunting?
● Hypothesis-led approach
● Determine gaps in the ability to detect and respond to threats
● It is a way to assess your security (people, process, and technology)
against threats while extending your automation footprint to better be
prepared in the future - Rob M Lee
● Incident Response without an actual incident done with a purpose -
Rob M Lee
Threat Detection vs Hunting
Detection: Automated with machines such as
IDS/IPS, AV, etc.; Focussed on known attacks,
IOCs, etc.
Hunting: Humans ïŹnd bad stuffs with the help
of machines; Hunting will lead to identifying
detection gaps and creation of new detections
Becoming the Threat Hunter
● The Threat Hunter role sits between the common offensive and
defensive roles
● The role needs strong offensive knowledge and defensive skills
● Skills - Analytical Mindset, OS and Network Architecture, Offensive
Skills (attack methods, TTPs, etc.), Host Analysis, Network Analysis,
Malware Analysis, Memory Analysis, Data Analysis (SIEM, Logs, PCAP,
NetïŹ‚ow, etc.), Hunting Tools
Hypothesis
● This is what makes Threat Hunting a Human Led activity
● Reasonable assumption about adversaries and techniques they might
be using to attack or persist in an environment
○ Example - Attackers will leverage signed windows binaries to
perform malicious activities, which will not be ïŹ‚agged by existing
security tools/controls
Ref: https://pages.endgame.com/rs/627-YBU-612/images/The%20Endgame%20Guide%20to%20Threat%20Hunting%20-%20ebook.pdf
Hypothesis
https://sqrrl.com/the-threat-hunting-reference-model-part-2-the-hunting-loop/
Useful Frameworks
Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
ATT&CK: https://attack.mitre.org
Diamond Model: http://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf
Useful Frameworks
Alerting and Detection Strategies (ADS) Framework
https://github.com/palantir/alerting-detection-strategy-framework
Hunting Maturity Model (HMM)
http://detect-respond.blogspot.com/2015/10/a-simple-hunting-
maturity-model.html
Pyramid of Pain
http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
Finally, What does a Threat Hunter has ?
To Develop Hunts:
● Collected Data
● Blogs
● Twitter
● MITRE ATT&CK
● APT Reports
● CTI
● Mailing List
● Red Teaming
● Adversary Simulation
● and many more ...
Example Hunts
● Hypothesis - Attackers are still using dyndns hostnames for C2
○ Take the List - https://gist.github.com/neu5ron/8dd695d4cb26b6dcd997
and compare with DNS queries in your environment
● Hypothesis - Attackers maintaining persistence using Runkeys
○ Collect RunKeys from your environment (using EDR tool or just using
powershell)
○ Group executables in Run Keys, Group Executable Paths, Command Line
arguments, etc.
http://pwndizzle.blogspot.com/2014/01/powershell-retrieve-run-keys-start-menu.htm
https://www.sans.org/cyber-security-summit/archives/ïŹle/summit-archive-1492713638.pdfl
Free and Open Source Tools to Assist in Hunts
● Endpoint
○ GRR - https://github.com/google/grr
○ Sysmon - https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
○ OSQuery - https://osquery.io
● Network
○ Bro - https://www.bro.org/download/index.html
○ Suricata - https://suricata-ids.org/
Free and Open Source Tools to Assist in Hunts
● Storage & Analytics
○ Elastic Stack - https://www.elastic.co/elk-stack
○ Logs - WinBeat, File Beat
○ HELK - https://github.com/Cyb3rWard0g/HELK
● Infrastructure
○ Puppet, Chef, Ansible, Docker, etc.
Useful Blogs
● Blogs:
○ David Bianco's Blog
○ sqrrl Hunting Blog
○ DFIR and Threat Hunting Blog
○ CyberWardog's Blog
○ Chris Sanders' Blog
○ Kolide Blog
○ Endgame Blog
○ Robert M Lee’s Blog
○ and many others whom I may have missed
References:
● https://sqrrl.com/media/Your-Practical-Guide-to-Threat-Hunting.pdf
● https://gsec.hitb.org/materials/sg2017/COMMSEC%20D1%20-%20Hamza%20Beghal%20-%20Threat%
20Hunting%20101%20-%20%20Become%20the%20Hunter.pdf
● https://www.sans.org/cyber-security-summit/archives/ïŹle/summit-archive-1492713638.pdf
● http://www.robertmlee.org/hunting-vs-incident-response-vs-just-doing-your-job/
● https://speakerdeck.com/heirhabarov/phdays-2018-threat-hunting-hands-on-lab
● https://www.youtube.com/watch?v=aZxtCKHhAUE
● https://www.sans.org/reading-room/whitepapers/threats/generating-hypotheses-successful-threat-hunti
ng-37172
Thank You

More Related Content

PPTX
Effective Threat Hunting with Tactical Threat Intelligence
Dhruv Majumdar
 
PPTX
Threat hunting - Every day is hunting season
Ben Boyd
 
PDF
Hunting for Privilege Escalation in Windows Environment
Teymur Kheirkhabarov
 
PDF
How to Hunt for Lateral Movement on Your Network
Sqrrl
 
PDF
Oracle RAC 19c and Later - Best Practices #OOWLON
Markus Michalewicz
 
PPTX
Threat hunting in cyber world
Akash Sarode
 
PDF
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Katie Nickels
 
PPTX
Threat hunting and achieving security maturity
DNIF
 
Effective Threat Hunting with Tactical Threat Intelligence
Dhruv Majumdar
 
Threat hunting - Every day is hunting season
Ben Boyd
 
Hunting for Privilege Escalation in Windows Environment
Teymur Kheirkhabarov
 
How to Hunt for Lateral Movement on Your Network
Sqrrl
 
Oracle RAC 19c and Later - Best Practices #OOWLON
Markus Michalewicz
 
Threat hunting in cyber world
Akash Sarode
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Katie Nickels
 
Threat hunting and achieving security maturity
DNIF
 

What's hot (20)

PPTX
Cyber Threat Hunting: Identify and Hunt Down Intruders
Infosec
 
PDF
Threat Hunting
Splunk
 
PPTX
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
PDF
Threat Hunting Procedures and Measurement Matrice
Vishal Kumar
 
PDF
Threat Hunting Report
Morane Decriem
 
PPTX
Cyber kill chain
Ankita Ganguly
 
PPTX
What is Threat Hunting? - Panda Security
Panda Security
 
PDF
Cyber Threat Intelligence
ZaiffiEhsan
 
PPTX
Security operation center (SOC)
Ahmed Ayman
 
PDF
Threat Hunting with Splunk Hands-on
Splunk
 
PPTX
Threat hunting for Beginners
SKMohamedKasim
 
PPTX
Cyber Threat Hunting with Phirelight
Hostway|HOSTING
 
PDF
Breach and attack simulation tools
Bangladesh Network Operators Group
 
PDF
Threat Hunting with Cyber Kill Chain
Suwitcha Musijaral CISSP,CISA,GWAPT,SNORTCP
 
PDF
Welcome to the world of Cyber Threat Intelligence
Andreas Sfakianakis
 
PDF
How MITRE ATT&CK helps security operations
Sergey Soldatov
 
PDF
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
 
PDF
Cyber Threat Intelligence
mohamed nasri
 
PDF
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE - ATT&CKcon
 
PDF
Cyber Threat hunting workshop
Arpan Raval
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Infosec
 
Threat Hunting
Splunk
 
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
Threat Hunting Procedures and Measurement Matrice
Vishal Kumar
 
Threat Hunting Report
Morane Decriem
 
Cyber kill chain
Ankita Ganguly
 
What is Threat Hunting? - Panda Security
Panda Security
 
Cyber Threat Intelligence
ZaiffiEhsan
 
Security operation center (SOC)
Ahmed Ayman
 
Threat Hunting with Splunk Hands-on
Splunk
 
Threat hunting for Beginners
SKMohamedKasim
 
Cyber Threat Hunting with Phirelight
Hostway|HOSTING
 
Breach and attack simulation tools
Bangladesh Network Operators Group
 
Threat Hunting with Cyber Kill Chain
Suwitcha Musijaral CISSP,CISA,GWAPT,SNORTCP
 
Welcome to the world of Cyber Threat Intelligence
Andreas Sfakianakis
 
How MITRE ATT&CK helps security operations
Sergey Soldatov
 
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
 
Cyber Threat Intelligence
mohamed nasri
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE - ATT&CKcon
 
Cyber Threat hunting workshop
Arpan Raval
 
Ad

Similar to Threat hunting 101 by Sandeep Singh (20)

PDF
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
Su Steve
 
PDF
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
Chi En (Ashley) Shen
 
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
PDF
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Aujas
 
PDF
What Are Script Kiddies.pdf
uzair
 
PDF
Cyber Threat Hunting Meap V05 Chapters 1 To 8 Of 13 Nadhem Alfardan
cawulineriku
 
PPTX
ITD BSides PDX Slides
EricGoldstrom
 
PDF
huntpedia.pdf
CecilSu
 
PDF
Huntpedia
Jc Sv
 
PDF
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
PPTX
Threat Modeling Web Applications
Nadia BENCHIKHA
 
PDF
How AI can help with cybersecurity
The Gulf Entrepreneur
 
PPTX
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
dagarabull
 
PDF
Threat Modeling Connect (TMC) Barcelona Meetup - Threat Modeling @ W3C - Age...
Simone Onofri
 
PPTX
Vulnerability in ai
SrajalTiwari1
 
PPTX
open access initiavtive for library .pptx
ssuserc5ebc8
 
PDF
Threat Modeling workshop by Robert Hurlbut
DevSecCon
 
PDF
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
PDF
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
PDF
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
Su Steve
 
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
Chi En (Ashley) Shen
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Aujas
 
What Are Script Kiddies.pdf
uzair
 
Cyber Threat Hunting Meap V05 Chapters 1 To 8 Of 13 Nadhem Alfardan
cawulineriku
 
ITD BSides PDX Slides
EricGoldstrom
 
huntpedia.pdf
CecilSu
 
Huntpedia
Jc Sv
 
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
Threat Modeling Web Applications
Nadia BENCHIKHA
 
How AI can help with cybersecurity
The Gulf Entrepreneur
 
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
dagarabull
 
Threat Modeling Connect (TMC) Barcelona Meetup - Threat Modeling @ W3C - Age...
Simone Onofri
 
Vulnerability in ai
SrajalTiwari1
 
open access initiavtive for library .pptx
ssuserc5ebc8
 
Threat Modeling workshop by Robert Hurlbut
DevSecCon
 
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
Ad

More from OWASP Delhi (20)

PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
PDF
Securing dns records from subdomain takeover
OWASP Delhi
 
PDF
Effective Cyber Security Report Writing
OWASP Delhi
 
PPTX
Data sniffing over Air Gap
OWASP Delhi
 
PPTX
UDP Hunter
OWASP Delhi
 
PDF
Demystifying Container Escapes
OWASP Delhi
 
PPTX
Automating WAF using Terraform
OWASP Delhi
 
PPTX
Actionable Threat Intelligence
OWASP Delhi
 
PPTX
Owasp top 10 vulnerabilities
OWASP Delhi
 
PPTX
Recon with Nmap
OWASP Delhi
 
PPTX
Securing AWS environments by Ankit Giri
OWASP Delhi
 
PDF
DMARC Overview
OWASP Delhi
 
PDF
Cloud assessments by :- Aakash Goel
OWASP Delhi
 
PDF
Pentesting Rest API's by :- Gaurang Bhatnagar
OWASP Delhi
 
ODP
Wireless security beyond password cracking by Mohit Ranjan
OWASP Delhi
 
PDF
IETF's Role and Mandate in Internet Governance by Mohit Batra
OWASP Delhi
 
PDF
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
OWASP Delhi
 
PPTX
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
PDF
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
OWASP Delhi
 
ODP
Hostile Subdomain Takeover by Ankit Prateek
OWASP Delhi
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
Securing dns records from subdomain takeover
OWASP Delhi
 
Effective Cyber Security Report Writing
OWASP Delhi
 
Data sniffing over Air Gap
OWASP Delhi
 
UDP Hunter
OWASP Delhi
 
Demystifying Container Escapes
OWASP Delhi
 
Automating WAF using Terraform
OWASP Delhi
 
Actionable Threat Intelligence
OWASP Delhi
 
Owasp top 10 vulnerabilities
OWASP Delhi
 
Recon with Nmap
OWASP Delhi
 
Securing AWS environments by Ankit Giri
OWASP Delhi
 
DMARC Overview
OWASP Delhi
 
Cloud assessments by :- Aakash Goel
OWASP Delhi
 
Pentesting Rest API's by :- Gaurang Bhatnagar
OWASP Delhi
 
Wireless security beyond password cracking by Mohit Ranjan
OWASP Delhi
 
IETF's Role and Mandate in Internet Governance by Mohit Batra
OWASP Delhi
 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
OWASP Delhi
 
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
OWASP Delhi
 
Hostile Subdomain Takeover by Ankit Prateek
OWASP Delhi
 

Recently uploaded (20)

PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
Comunidade Salesforce SĂŁo Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira JĂșnior
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
C Programming Basics concept krnppt.pptx
Karan Prajapat
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
PDF
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
DevOps & Developer Experience Summer BBQ
AUGNYC
 
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PDF
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
Software Development Methodologies in 2025
KodekX
 
Comunidade Salesforce SĂŁo Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira JĂșnior
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
C Programming Basics concept krnppt.pptx
Karan Prajapat
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
DevOps & Developer Experience Summer BBQ
AUGNYC
 
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
This slide provides an overview Technology
mineshkharadi333
 
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
Software Development Company | KodekX
KodekX
 
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 

Threat hunting 101 by Sandeep Singh

  • 2. Agenda ● What is Threat Hunting? ● Becoming the Threat Hunter ● Hypothesis Generation ● Useful Frameworks ● Example Hunts ● Free and Open Source Tools to Assist in Hunts ● Further Learning Resources
  • 3. The Rise of Yet Another Buzzword 2016-2017ish - Threat Hunting started making buzz https://www.outlookmarketingsrv.com/the-buzzword-epidemic-is-your-content-infected/
  • 4. What is Threat Hunting? Human Led (and assisted by tools) practice of searching iteratively through data to detect advanced threats that evade traditional security controls (Sqrrl and Me)
  • 5. What is Threat Hunting? ● Hypothesis-led approach ● Determine gaps in the ability to detect and respond to threats ● It is a way to assess your security (people, process, and technology) against threats while extending your automation footprint to better be prepared in the future - Rob M Lee ● Incident Response without an actual incident done with a purpose - Rob M Lee
  • 6. Threat Detection vs Hunting Detection: Automated with machines such as IDS/IPS, AV, etc.; Focussed on known attacks, IOCs, etc. Hunting: Humans ïŹnd bad stuffs with the help of machines; Hunting will lead to identifying detection gaps and creation of new detections
  • 7. Becoming the Threat Hunter ● The Threat Hunter role sits between the common offensive and defensive roles ● The role needs strong offensive knowledge and defensive skills ● Skills - Analytical Mindset, OS and Network Architecture, Offensive Skills (attack methods, TTPs, etc.), Host Analysis, Network Analysis, Malware Analysis, Memory Analysis, Data Analysis (SIEM, Logs, PCAP, NetïŹ‚ow, etc.), Hunting Tools
  • 8. Hypothesis ● This is what makes Threat Hunting a Human Led activity ● Reasonable assumption about adversaries and techniques they might be using to attack or persist in an environment ○ Example - Attackers will leverage signed windows binaries to perform malicious activities, which will not be ïŹ‚agged by existing security tools/controls Ref: https://pages.endgame.com/rs/627-YBU-612/images/The%20Endgame%20Guide%20to%20Threat%20Hunting%20-%20ebook.pdf
  • 10. Useful Frameworks Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html ATT&CK: https://attack.mitre.org Diamond Model: http://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf
  • 11. Useful Frameworks Alerting and Detection Strategies (ADS) Framework https://github.com/palantir/alerting-detection-strategy-framework Hunting Maturity Model (HMM) http://detect-respond.blogspot.com/2015/10/a-simple-hunting- maturity-model.html Pyramid of Pain http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
  • 12. Finally, What does a Threat Hunter has ? To Develop Hunts: ● Collected Data ● Blogs ● Twitter ● MITRE ATT&CK ● APT Reports ● CTI ● Mailing List ● Red Teaming ● Adversary Simulation ● and many more ...
  • 13. Example Hunts ● Hypothesis - Attackers are still using dyndns hostnames for C2 ○ Take the List - https://gist.github.com/neu5ron/8dd695d4cb26b6dcd997 and compare with DNS queries in your environment ● Hypothesis - Attackers maintaining persistence using Runkeys ○ Collect RunKeys from your environment (using EDR tool or just using powershell) ○ Group executables in Run Keys, Group Executable Paths, Command Line arguments, etc. http://pwndizzle.blogspot.com/2014/01/powershell-retrieve-run-keys-start-menu.htm https://www.sans.org/cyber-security-summit/archives/ïŹle/summit-archive-1492713638.pdfl
  • 14. Free and Open Source Tools to Assist in Hunts ● Endpoint ○ GRR - https://github.com/google/grr ○ Sysmon - https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon ○ OSQuery - https://osquery.io ● Network ○ Bro - https://www.bro.org/download/index.html ○ Suricata - https://suricata-ids.org/
  • 15. Free and Open Source Tools to Assist in Hunts ● Storage & Analytics ○ Elastic Stack - https://www.elastic.co/elk-stack ○ Logs - WinBeat, File Beat ○ HELK - https://github.com/Cyb3rWard0g/HELK ● Infrastructure ○ Puppet, Chef, Ansible, Docker, etc.
  • 16. Useful Blogs ● Blogs: ○ David Bianco's Blog ○ sqrrl Hunting Blog ○ DFIR and Threat Hunting Blog ○ CyberWardog's Blog ○ Chris Sanders' Blog ○ Kolide Blog ○ Endgame Blog ○ Robert M Lee’s Blog ○ and many others whom I may have missed
  • 17. References: ● https://sqrrl.com/media/Your-Practical-Guide-to-Threat-Hunting.pdf ● https://gsec.hitb.org/materials/sg2017/COMMSEC%20D1%20-%20Hamza%20Beghal%20-%20Threat% 20Hunting%20101%20-%20%20Become%20the%20Hunter.pdf ● https://www.sans.org/cyber-security-summit/archives/ïŹle/summit-archive-1492713638.pdf ● http://www.robertmlee.org/hunting-vs-incident-response-vs-just-doing-your-job/ ● https://speakerdeck.com/heirhabarov/phdays-2018-threat-hunting-hands-on-lab ● https://www.youtube.com/watch?v=aZxtCKHhAUE ● https://www.sans.org/reading-room/whitepapers/threats/generating-hypotheses-successful-threat-hunti ng-37172