Home
Github
  • 👋Welcome !
  • 🚩CTF Writeups
    • SKR CTF
      • Binary
        • Auth Me 2.0
      • Misc
        • Schrodinger's Cat 2
      • Reverse Engineering
        • Nogard 3
    • osu!gaming CTF 2024
      • pwn
        • betterthanu
    • Crackmes
      • PieIsMyFav
      • Plain Sight
    • WolvCTF 2024
      • pwn
        • babypwn
    • TexSAW CTF 2024
      • rev
        • Catch The White Rabbit
      • Forensics
        • Malicious Threat
        • MalWhere?
    • SwampCTF 2024
      • Misc
        • Lost Some Magic
        • The Time Equations
    • pwnable.kr
      • Toddler's Bottle
        • fd
    • Codegate CTF 2024
      • ai
        • ai_warmup
    • Junior Crypt CTF 2024
      • Misc
        • Terms of Use
      • Forensics
        • Admin Rights
        • Confusion
      • PPC
        • l33t
    • IHack 2024 Qualification
      • DFIR
        • Happy SPLUNKing
      • Malware
        • Confusing Javascript
    • Malcore Challenge
    • Intern Task
      • SQLI
  • 📮Room/Machine
    • HTB - Sherlock
      • DFIR
        • Brutus
        • Unit42
        • Jingle Bell
  • 📚Notes
    • CTF Related
      • pwn
        • pwntools
        • Format String Vulnerability
        • Integer Overflow
        • Executable Properties
        • gdb-gef
        • Template Script
      • b2r/koth
    • Assembly Language
    • x86 Architecture
  • 🛠️Tools
    • DFIR
    • Malware Analysis
    • Essentials
  • 👽Threat Hunting
    • Intro
    • Common Tactics
    • Methodologies
    • Types of threat hunting
  • 😸whoami
    • About Me
    • Other
      • FYP
  • Archives
    • 3108 CTF
      • Kategori
        • Tugasan Utama : Warkah Untuk Perwira
          • Tugasan I : Seruan Perwira
          • Tugasan II : Tali Barut
          • Warkah Akhir
        • Web
          • Lemah
          • Pantun Pantul
          • Wantujus
          • Wantusom
        • Reverse Engineering
          • Pa+rio+ik
          • Sarawak
        • Network
          • Johan
          • Lagi-lagi Johan
        • Misc
          • 3108 CTF Town
          • Mencari Rahsia Si Dia
        • Cryptography
          • 1957bit
          • Nasihat
          • Selamat Malam
        • OSINT
          • Pertemuan Kapisata : Babak I
          • Pertemuan Kapista : Babak II
          • Pertemuan Kapista : Finale
    • Curtin CTF 2023
      • Pwn n Rev
        • Classic Bufferoverflow
        • Intro to Buffer Overflow
        • Don't Go Overboard
        • Don't Go Overboard 2
        • Let The Random Games Begin1
        • Let The Random Games Begin 2
        • Let The Random Games Begin 3
    • 1337UP LIVE CTF
      • Pwn
        • Floor Mat Store
    • HTB University CTF 2023
      • Reverse Engineering
        • Windows Of Opportunity
Powered by GitBook
On this page
  • Guide
  • Reconnaissance - TA0043
  • Initial Access - TA0001
  • Execution - TA0002
  • Persistence - TA0003
  • Privilege Escalation - TA0004
  • Credential Access - TA0006
  1. whoami
  2. Other

FYP

a simple guide on how to use the threat hunting tool

Last updated 11 months ago

Guide

According to MITRE ATT&CK Frameworks, there are a lot of TTP can be used by attacker.

Below are the description and what to search for.


Reconnaissance - TA0043

T1595.001

Name: Scanning IP blocks

Description: Attacker scanning victim's IP block to gather network information.

Data Source: Access Log

Keyword: nmap

Reference:

T1595.002

Name: Vulnerability Scanning

Description: Attacker may scan victim for known or unknown vulnerability to exploit

Data Source: Access Log

Keyword: nmap

Reference:

T1595.003

Name: Wordlist Scanning

Description: Attacker may use brute forcing or crawling technique to understand the victim's infrastructure

Data Source: Access Log

Keyword: gobuster, dirbuster

Reference:


Initial Access - TA0001

T1133

Name: External Remote Services

Description: Adversaries may leverage external-facing remote services to initially access and/or persist within a network

Data Source: Auth Log

Keyword: ssh, sshd

Valid Accounts - T1078

T1078.003

Name: Local Accounts

Description: Adversaries may obtain and abuse credentials of a local account

Data Source: Auth Log

Keyword: failed, Failed, Accept, Accepted, accept, accepted


Execution - TA0002

Command and Scripting Interpreter - T1059

T1059.004

Name: Unix Shell

Description: Adversaries may abuse Unix shell commands and scripts for execution

Data Source: Auth Log

Keyword: COMMAND

Data Source: Command History

Keyword: <anything>

Scheduled Task/Job - T1053

T1053.003

Name: Cron

Description: Adversaries may abuse the cron utility to perform task scheduling for initial or recurring execution of malicious code

Data Source: Auth Log, Syslog

Keyword: CRON


Persistence - TA0003

Create Account - T1136

T1136.001

Name: Local Account

Description: Adversaries may create a local account to maintain access to victim systems

Data Source: Auth Log

Keyword: useradd, usermod


Privilege Escalation - TA0004

Abuse Elevation Control Mechanism - T1548

T1548.003

Name: Sudo and Sudo Caching

Description: Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges

Data Source: Auth Log

Keyword: sudo


Credential Access - TA0006

Brute Force - T1110

T1110.001, T1110.002, T1110.003, T1110.004

Name: Password Guessing, Password Cracking, Password Spraying, Credential Stuffing

Description: Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained

Data Source: Auth Log

Keyword: Failed password, password

Reference:

Reference:

Reference:

Reference:

Reference:

Reference:

Reference:

😸
https://attack.mitre.org/techniques/T1595/001/
https://attack.mitre.org/techniques/T1595/002/
https://attack.mitre.org/techniques/T1595/003/
https://attack.mitre.org/techniques/T1133/
https://attack.mitre.org/techniques/T1078/
https://attack.mitre.org/techniques/T1059/004/
https://attack.mitre.org/techniques/T1053/003/
https://attack.mitre.org/techniques/T1136/001/
https://attack.mitre.org/techniques/T1548/003/
https://attack.mitre.org/techniques/T1110/