i take one breath / mint at a time

Threat Hunting Immersive Notes from Active Measures

#threathunting #log

What is threat-hunting? An overview of terms.

As defined by NIST: Threat-hunting is “the proactive searching of organization systems, networks, and infrastucture for advanced threats. The objective is to track and disrupt cyber adversaries as early as possible in the attack sequence and to measurably improve the speed and accuracy of organization responses.”

IOC (Indicators of Compromise) can be defined as “pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network.” IOC can be network-based or Host-based. Beginners might use IOC lists

FQDN: Fully Qualified Domain Name.

Threat-hunting as a hypothesis-based method

Follow-up Questions

Why is “DNS over HTTPS” not real security?

What is TTL?

What is DMZ?

Detection for C2

What to look for in Threat Hunting Analysis:

How to track?

Other follow-up Questions: