The art of Hunting - Exposed!

The art of Hunting - Exposed!

Oftentimes, people presume that cyber threat hunting is a process that is highly dependent on tooling. While tooling is an important element of the process, the artistic element still plays a significant role in the overall success of the hunt.

Let me explain the process metaphorically using a “Forest Hunt” mission.

let’s assume you have been tasked to conduct a reconnaissance mission in a forest to confirm that no one is hiding in the woods. Now let me assure you that starting your hunt with gun or knife (i.e. IR tools) will not give you better chances on “finding” the criminal. No doubt, those are useful weapons to have but they are not what you need at this stage.

Your mission as a threat hunter is to find the intruder but not to neutralize it (more on this coming below).

What you really need is someone with hunting instinct and reasoning, someone who knows the forest inside out, someone who knows criminal thinking, what they are after and where they typically conceal.

This person will also leverage other situational awareness inputs like weather, rain, rivers, shelters to anticipate the next move of the intruder. Basically, observing everything within your hunting range and look for the reasons why things are as they are.

Reasoning the environmental abnormalities will help you uncover IOC’s (Indicators of Compromise) such as bird flocks and foot prints. All those skills are equivalent to the technical TTPs (Tactics, Techniques and Procedures) we use in the digital equivalent of the forest hunt.

Another important aspect of threat hunting is to know when to stop. For example when you find the intruder, your mission is done as a threat hunter. You will now need to engage your incident response team (i.e SWAT) with their state of the art “skills” and “tooling” to neutralize the target. Once the target is neutralized, now shift your focus on how to prevent recurrence of the incident. Use the knowledge and the experience gained during the hunt to improve the capabilities of your detection and prevention systems.

Hunting is subjective and not every hunt is successful. You never know if this was the only intruder in your forest. With this, I would like to leave you with one question?

The hunting season is coming, what role you want to play, the “Predator” or “Prey”?

--------------------------------------------------------------------------------------------------------------

Would you like more interesting articles?

#cybersecurity #informationsecurity #security #infosec #securitynews #datasecurity #ddosattacks #threathunting

#cybersecurity #security #informationsecurity #ddosattacks #ddosprotection #infosec #samurai #ronin #japanese #miyamotomusashi #incidentmanagement #incidentresponse #cisos #cisolife #incident #incidents #cert #cloudsecurity #cloudcompliance #incidentresponseplan #responsiveness #humanintelligence #humanfactor #cisomag #cisoseries #cyberresiliency #cloudapplications #cloudinfrastructure #cloudarchitecture #secops #incidentes #eventmanagement

要查看或添加评论,请登录

Youssef Elmalty的更多文章

  • Security by Reassurance

    Security by Reassurance

    With the current wide access to information, many of us are able to acquire and analyze information that can be used in…

    26 条评论
  • Place your bet, Security or Compliance?

    Place your bet, Security or Compliance?

    Many believes that security is binary game that will lead you to win or lose. Well, this is not true.

    27 条评论
  • How to specialize in cybersecurity?

    How to specialize in cybersecurity?

    I have received several inquiries from computer science students and fresh graduates about which specialization they…

    6 条评论
  • If you are not hunting, you will be hunted!

    If you are not hunting, you will be hunted!

    We are good. We have checked all our detection and monitoring tools, nothing abnormal.

  • You can only fight the way you practice

    You can only fight the way you practice

    In cybersecurity, many tend to believe that having incident response plan hanging around waiting for the response team…

  • Why Compliance does not equal security?

    Why Compliance does not equal security?

    Being compliant is a wonderful thing to do, and in many cases, you will have no choice but to comply to be able to run…

    18 条评论
  • Security is a journey not a destination!

    Security is a journey not a destination!

    Security is a state of being free from any predefined threats. The reason I choose the word "predefined" because…

    5 条评论
  • Are you looking for a new home?

    Are you looking for a new home?

    Yes, I am talking about homes today, but there is a catch at the end. Below are some fundamental measures that you…

    3 条评论
  • Should you invest in cybersecurity?

    Should you invest in cybersecurity?

    I get it, the cost associated with security investments is high, but I can guarantee you that the cost of doing nothing…

    2 条评论
  • What is your cyber condition?

    What is your cyber condition?

    Organizations should operate with the impression that they "are" and "will" always be under attack. If the bad guys are…

社区洞察

其他会员也浏览了