Skip to content
This repository has been archived by the owner on Nov 2, 2024. It is now read-only.

Latest commit

 

History

History
executable file
·
69 lines (44 loc) · 2.17 KB

020-Threat-Hunting.md

File metadata and controls

executable file
·
69 lines (44 loc) · 2.17 KB

Threat Hunting

Definition

A cyber security technique designed to detect presence of threat that have not been discovered by a normal security monitoring.

  • Proactive, as oppose to reactive incidence response.
  • Threat Hunting is potentially less disruptive that penetration testing

Phases of Threat Hunting

  • Establishing a hypothesis
  • Profiling Threat Actors and Activities
  • Actual Threat Hunting

Establishing a hypothesis

A hypothesis is derived from the threat modeling and is based on potential events with higher likelihood and higher impact.

  • Who might want to harm us?
  • Who might want to break our networks?
  • How might they be able to do that?

Profiling Threat Actors and Activities

Involves the creation of scenario that show how a prospective attacker might attempt an intrusion and what their objectives might be.

  • What TTPs might they use?
  • Who wants to harm us?
  • What are their objectives?
  • Which threat actor categories do they belong?

Actual Threat Hunting

Threat hunting relies on the usage of the tools developed for regular security monitoring and incident response.

  • Analyze logs, file systems, registries, and network traffic
  • Information is generally consolidated in SIEM
  • Analyze other infected host
  • Identify how the malicious process was executed

Threat hunting consumes a lot of resources and time to conduct, but can yield a lot of benefits.

  • Improve detection capabilities
  • Integrate intelligence
  • Reduces attack surface
  • Block attack vectors
  • Identify critical assets

Threat Hunting vs. Normal SOC Monitoring

  • Assume that all existing rules have failed.
  • Seek undetected issues, or those that have bypassed the rules.
  • Assume smart adversaries have good TTPs to avoid detection.
  • Explore cases where queries do not return expected data.

Back to main page