Home
Github
  • 👋Welcome !
  • 🚩CTF Writeups
    • SKR CTF
      • Binary
        • Auth Me 2.0
      • Misc
        • Schrodinger's Cat 2
      • Reverse Engineering
        • Nogard 3
    • osu!gaming CTF 2024
      • pwn
        • betterthanu
    • Crackmes
      • PieIsMyFav
      • Plain Sight
    • WolvCTF 2024
      • pwn
        • babypwn
    • TexSAW CTF 2024
      • rev
        • Catch The White Rabbit
      • Forensics
        • Malicious Threat
        • MalWhere?
    • SwampCTF 2024
      • Misc
        • Lost Some Magic
        • The Time Equations
    • pwnable.kr
      • Toddler's Bottle
        • fd
    • Codegate CTF 2024
      • ai
        • ai_warmup
    • Junior Crypt CTF 2024
      • Misc
        • Terms of Use
      • Forensics
        • Admin Rights
        • Confusion
      • PPC
        • l33t
    • IHack 2024 Qualification
      • DFIR
        • Happy SPLUNKing
      • Malware
        • Confusing Javascript
    • Malcore Challenge
    • Intern Task
      • SQLI
  • 📮Room/Machine
    • HTB - Sherlock
      • DFIR
        • Brutus
        • Unit42
        • Jingle Bell
  • 📚Notes
    • CTF Related
      • pwn
        • pwntools
        • Format String Vulnerability
        • Integer Overflow
        • Executable Properties
        • gdb-gef
        • Template Script
      • b2r/koth
    • Assembly Language
    • x86 Architecture
  • 🛠️Tools
    • DFIR
    • Malware Analysis
    • Essentials
  • 👽Threat Hunting
    • Intro
    • Common Tactics
    • Methodologies
    • Types of threat hunting
  • 😸whoami
    • About Me
    • Other
      • FYP
  • Archives
    • 3108 CTF
      • Kategori
        • Tugasan Utama : Warkah Untuk Perwira
          • Tugasan I : Seruan Perwira
          • Tugasan II : Tali Barut
          • Warkah Akhir
        • Web
          • Lemah
          • Pantun Pantul
          • Wantujus
          • Wantusom
        • Reverse Engineering
          • Pa+rio+ik
          • Sarawak
        • Network
          • Johan
          • Lagi-lagi Johan
        • Misc
          • 3108 CTF Town
          • Mencari Rahsia Si Dia
        • Cryptography
          • 1957bit
          • Nasihat
          • Selamat Malam
        • OSINT
          • Pertemuan Kapisata : Babak I
          • Pertemuan Kapista : Babak II
          • Pertemuan Kapista : Finale
    • Curtin CTF 2023
      • Pwn n Rev
        • Classic Bufferoverflow
        • Intro to Buffer Overflow
        • Don't Go Overboard
        • Don't Go Overboard 2
        • Let The Random Games Begin1
        • Let The Random Games Begin 2
        • Let The Random Games Begin 3
    • 1337UP LIVE CTF
      • Pwn
        • Floor Mat Store
    • HTB University CTF 2023
      • Reverse Engineering
        • Windows Of Opportunity
Powered by GitBook
On this page
  • Threat hunting
  • Basis for Threat Hunting
  • What do we hunt for?
  • How do we hunt for it?
  • Attack Signatures and IOCs
  • Logical Queries for Vulnerability Hunting
  • Patterns of Activity in Threat Hunting:
  • Goals (or should i say why?)
  1. Threat Hunting

Intro

shout out to Tryhackme for this interesting room!

Last updated 1 year ago

Threat hunting

  • is an approach to finding cyber security threats where there’s an active effort done to look for signs of malicious activity.

  • basically we hunt/search for a threat in our environment

  • it is contrast with Incident Response (IR)

Reactive Approach
Proactive Approach

Incident Response

Threat Hunting

Triggered by an initial notification / alert

Active search for suspicious events that can become incidents

Guided by the initial scope of the incident

Guided by Threat Intelligence

"There's a threat that needs to be dealt with now."

"There might be a threat that we don't know yet."


  • Start with Accurate Leads:

    • Utilize known relevant malware and trusted Threat Intelligence.

    • Leads provide better chances for success, from simple tasks to complex projects.

  • Threat Intelligence:

    • Understand threats to predict their behavior within your environment.

    • Helps in narrowing down search to specific targets or tactics.

  • Unique Threat Intelligence:

    • Internal intrusion experience allows for developing valuable intelligence.

    • Provides insights unique to your organization, such as Indicators of Compromise (IOCs).

  • Threat Intelligence Feeds:

    • Access publicly available platforms like MISP for shared intelligence.

    • Invest in paid resources like Recorded Future or ReliaQuest for tailored intelligence.

    • Paid services offer extraordinary insights but come at a cost.


General
Example(s)

Known Relevant Malware

Attack Residue

  • Indicators of Attack (IOA)

  • Indicators of Compromise (IOC)

Known Vulnerability

  • 0-day

  • CVE


Attack Signatures and IOCs

  • Characterizing the Threat:

    • Condense the identified threat into specific and actionable identifiers.

    • Facilitates immediate recognition of the threat during hunting.

  • Attack Signatures:

    • Define patterns or behaviors indicative of the threat.

    • Helps in identifying relevant malware, attack residues, and exploited vulnerabilities.

  • Indicators of Compromise (IOCs):

    • Specific pieces of data indicating malicious activity.

    • Include traces of the adversary's actions within the environment.

  • Comparing with Historical Data:

    • Use Attack Signatures and IOCs to compare with available historical data.

    • Eases the process of finding objects of interest within the environment.

  • Understanding Environment Behavior:

    • Knowledge of environment behavior aids in recognizing exploited vulnerabilities.

    • Understanding log patterns when vulnerabilities are exploited is crucial.

Logical Queries for Vulnerability Hunting

  • Utilizing Logical Queries:

    • Certain hunting projects benefit from logical queries for efficient results.

    • Example: Hunting for assets with known vulnerabilities.

  • Characterizing Vulnerable Assets:

    • Define specific actionable identifiers for vulnerable assets (e.g., application version).

    • These identifiers facilitate crafting logical queries to filter for vulnerable assets.

  • Crafting Queries:

    • Create queries that filter assets based on identified vulnerabilities.

    • Target low-hanging fruits for easy pickings while directly impacting the organization's security posture.

  • Efficient Impact:

    • Logical queries streamline the hunting process, leading to efficient identification of vulnerable assets.

    • Addressing vulnerabilities promptly improves the organization's overall security posture.

Patterns of Activity in Threat Hunting:

  • Characterizing Threat Behavior:

    • After narrowing down specific threats (e.g., threat actors), focus shifts to characterizing their behavior.

    • Understanding patterns of activity aids in anticipating and detecting malicious actions.

  • MITRE ATT&CK Matrix:

    • Key resource for analyzing adversary tactics, techniques, and procedures (TTPs).

    • Provides a comprehensive framework for understanding and categorizing threat behaviors.

  • Utilizing MITRE ATT&CK:

    • Identify relevant techniques and procedures used by the threat actors.

    • Map observed behaviors to the corresponding entries in the ATT&CK Matrix for classification and analysis.

  • Enhancing Detection Capabilities:

    • By understanding common patterns of activity, detection capabilities can be enhanced.

    • Helps in proactively identifying and mitigating potential threats based on known TTPs.

  • Continuous Improvement:

    • Regularly update and refine hunting strategies based on new insights and emerging threat trends.

    • MITRE ATT&CK Matrix serves as a dynamic tool for ongoing threat intelligence and hunting efforts.


  • Discover Pre-existing Bad:

    • Malicious activities may evade detection mechanisms due to their complexity or chance.

    • Threat Hunting identifies such activities, triggering immediate Incident Response.

    • Learnings from hunts feed back into the continuous monitoring process of the Security Operations Center (SOC).

  • Minimize Dwell Time of Attackers:

    • Undetected threat actor activity grants them a 'free pass' to explore the environment.

    • Longer dwell time increases the risk of sophisticated attacks and data theft.

    • Threat Hunting aims to minimize dwell time to mitigate potential damage to assets and data.

  • Develop Additional Detection Methods:

    • Use findings from Threat Hunting to develop new detection mechanisms.

    • Continuous improvement ensures future threats are quickly detected and mitigated.

    • Translate threat profiles into actionable detection methods to enhance overall security posture.

Basis for Threat Hunting

What do we hunt for?

How do we hunt for it?

Goals (or should i say why?)

👽
📔
😯
🤔
🎯
theZoo
Threat Encyclopedia
📖