SlideShare a Scribd company logo
Cyber Threat Hunting
Identify and Hunt Down
Intruders
● InfoSec Institute webinars are a great way to earn
CPEs
● Certificates of completion are available upon
request: infosecinstitute.com/cpe
● CPE eligibility requirements vary by certifying body.
Learn more: infosecinstitute.com/cpe-requirements
Looking for CPEs?
Meet Your Speakers
Jeremy Martin
Senior Security Researcher
InfoSec Institute Instructor
Camille DuPuis
Moderator
InfoSec Institute
Overview: Red Team vs. Blue Team
What is a Blue Team?
A Blue Team is a group of
subject matter experts that
ensures the defensive security
measures put in place are
effective. Cyber Threat Hunters
are members of a Blue Team
focused on finding, assessing
and removing cyber threats.
The Emergence of Cyber Threat Hunters
A Shift in Mindset
100% prevention is impossible. Intruders will get in and can
go undiscovered for a months or longer (197-day avg. to
identify a breach, according to 2018 Ponemon survey)
Assumption of Breach
Need an active defense. Can’t rely on set-and-forget
security tools. Need to put on their sleuthing hats and
actively discover threats.
3 Essential Factors for Threat Hunting
The Hunter
What is the skill and
experience level of
the threat hunter?
The Tools
What tools are being
used to collect and
analyze the data?
The Data
What is the quality of
the collected data?
Prepare for the Hunt
Simple Threat Hunting Process
Collect and Process Data
Establish the Hypothesis
Hunt
Identify
Respond
Threat Hunting Methodologies
Analytics-Driven
-Uses models and frameworks
to structure data and avoid
biases
-Diamond Model of Intrusion
Analysis is one example
Awareness-Driven
-Focus most important assets,
information and locations
-Conduct a Crown Jewels
Analysis to prioritize
Intelligence-Driven
-Understanding TTPs via IOCs
-May result in alerts and log
entries that can be prioritized
for investigation
Creating a Hypothesis
What are You Hunting for?
Searching for Unusual Behavior
Indicators of Compromise (IOCs): Includes forensics data,
log files and other factors that can help identify potential
malicious activity that has already occurred
Indicators of Attack (IOAs): Similar to IOCs, but can help you
understand attacks in progress
Network-based Artifacts: Search for malware
communication and use tools such as session recording,
packet capture and network state monitoring
Host-based Artifacts: Search endpoints and look for
malware interaction within the registry, file system and
elsewhere
What You May Find
➢ Irregular traffic
➢ Misused protocols
➢ Port-application mismatches
➢ Web shells and other threats
➢ Irregularities in processes
➢ Registry and file system
changes
➢ Abnormal account activity
➢ Abnormal database read
volume
➢ And more ...
Understand Your Threat Hunting Maturity Level
HMM 0
Initial
HMM 1
Minimal
HMM 2
Procedural
HMM 3
Innovative
HMM 4
Leading
-Relies primarily on
automated alerting
-Little or no routine
data collection
-Incorporates
threat intelligence
indicator searches
-Moderate or high
level of routine
data collection
-Follows data
analysis
procedures created
by others
-High or very high
level of routine
data collection
-Creates new data
analysis
procedures
-High or very high
level of routine
data collection
-Automates
majority of
successful data
analysis
procedures
-High or very high
level of routine
data collection
Cyber Threat Hunting
Flex Pro boot camp:
➢ Learn to identify, hunt down and analyze
cyber threats
➢ Learn to use the Hunting Maturity Model to
measure your organization's threat hunting
capability
➢ Build an effective threat hunting solution
based on open-source tools
➢ Become a Certified Cyber Threat Hunting
Professional (CCTHP)
Why Train with InfoSec Institute
Free Hacking Toys when You Enroll
www2.infosecinstitute.com/gifts
Questions?
Thank you for joining us!
infosecinstitute.com/cyber-threat-hunting/
708-274-7267

More Related Content

What's hot

6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
Steve Lodin
 

What's hot (20)

Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 
Threat hunting in cyber world
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber world
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
 

Similar to Cyber Threat Hunting: Identify and Hunt Down Intruders

Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
 

Similar to Cyber Threat Hunting: Identify and Hunt Down Intruders (20)

Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Mis 1
Mis 1Mis 1
Mis 1
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
 

More from Infosec

More from Infosec (20)

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 

Cyber Threat Hunting: Identify and Hunt Down Intruders

  • 1. Cyber Threat Hunting Identify and Hunt Down Intruders
  • 2. ● InfoSec Institute webinars are a great way to earn CPEs ● Certificates of completion are available upon request: infosecinstitute.com/cpe ● CPE eligibility requirements vary by certifying body. Learn more: infosecinstitute.com/cpe-requirements Looking for CPEs?
  • 3. Meet Your Speakers Jeremy Martin Senior Security Researcher InfoSec Institute Instructor Camille DuPuis Moderator InfoSec Institute
  • 4. Overview: Red Team vs. Blue Team What is a Blue Team? A Blue Team is a group of subject matter experts that ensures the defensive security measures put in place are effective. Cyber Threat Hunters are members of a Blue Team focused on finding, assessing and removing cyber threats.
  • 5. The Emergence of Cyber Threat Hunters A Shift in Mindset 100% prevention is impossible. Intruders will get in and can go undiscovered for a months or longer (197-day avg. to identify a breach, according to 2018 Ponemon survey) Assumption of Breach Need an active defense. Can’t rely on set-and-forget security tools. Need to put on their sleuthing hats and actively discover threats.
  • 6. 3 Essential Factors for Threat Hunting The Hunter What is the skill and experience level of the threat hunter? The Tools What tools are being used to collect and analyze the data? The Data What is the quality of the collected data? Prepare for the Hunt
  • 7. Simple Threat Hunting Process Collect and Process Data Establish the Hypothesis Hunt Identify Respond
  • 8. Threat Hunting Methodologies Analytics-Driven -Uses models and frameworks to structure data and avoid biases -Diamond Model of Intrusion Analysis is one example Awareness-Driven -Focus most important assets, information and locations -Conduct a Crown Jewels Analysis to prioritize Intelligence-Driven -Understanding TTPs via IOCs -May result in alerts and log entries that can be prioritized for investigation Creating a Hypothesis
  • 9. What are You Hunting for? Searching for Unusual Behavior Indicators of Compromise (IOCs): Includes forensics data, log files and other factors that can help identify potential malicious activity that has already occurred Indicators of Attack (IOAs): Similar to IOCs, but can help you understand attacks in progress Network-based Artifacts: Search for malware communication and use tools such as session recording, packet capture and network state monitoring Host-based Artifacts: Search endpoints and look for malware interaction within the registry, file system and elsewhere What You May Find ➢ Irregular traffic ➢ Misused protocols ➢ Port-application mismatches ➢ Web shells and other threats ➢ Irregularities in processes ➢ Registry and file system changes ➢ Abnormal account activity ➢ Abnormal database read volume ➢ And more ...
  • 10. Understand Your Threat Hunting Maturity Level HMM 0 Initial HMM 1 Minimal HMM 2 Procedural HMM 3 Innovative HMM 4 Leading -Relies primarily on automated alerting -Little or no routine data collection -Incorporates threat intelligence indicator searches -Moderate or high level of routine data collection -Follows data analysis procedures created by others -High or very high level of routine data collection -Creates new data analysis procedures -High or very high level of routine data collection -Automates majority of successful data analysis procedures -High or very high level of routine data collection
  • 11. Cyber Threat Hunting Flex Pro boot camp: ➢ Learn to identify, hunt down and analyze cyber threats ➢ Learn to use the Hunting Maturity Model to measure your organization's threat hunting capability ➢ Build an effective threat hunting solution based on open-source tools ➢ Become a Certified Cyber Threat Hunting Professional (CCTHP) Why Train with InfoSec Institute
  • 12. Free Hacking Toys when You Enroll www2.infosecinstitute.com/gifts
  • 14. Thank you for joining us! infosecinstitute.com/cyber-threat-hunting/ 708-274-7267

Editor's Notes

  1. Jeremy Martin is a Senior Security Researcher that has focused his profession around Red Team penetration testing, Computer Forensics, Open source Intelligence, and Cyber Warfare. Starting his career in 1995 Mr. Martin has worked with fortune 200 companies and Federal Government agencies, receiving a number of awards for service. Jeremy currently provides training and works with several governmental incident response and computer forensics departments. Outside consulting, he is an instructor, security researcher, published author, and speaks at security conferences around the world. Mr. Martin’s current research projects include vulnerability analysis, threat profiling, exploitation automation, anti-forensics, open source intelligence gathering, and reverse engineering malware. As an active member of the global Information Security and Assurance communities, Jeremy volunteers for the local ISSA and ACFEI chapters. He also holds several positions for internationally recognized organizations. In 2006-2012, he was elected as the President of the Open Information Systems Security Group (OISSG), while sitting on the Board of Directors for Denver’s InfraGard chapter. From 2005-2010, he has held a state coordinator position for the ACHEI Certified in Homeland Security division. Mr. Martin currently holds over 30 professional certifications.
  2. If you’d like more information right away, you can head to infosecinstitute.com or call to speak with a rep about the course and the current promotion. If you have any other questions please direct them to info@infosecinstitute.com and we’ll be sure to get back to you soon.