The document discusses threat hunting techniques using Splunk, including an overview of threat hunting basics, data sources for threat hunting, and Lockheed Martin's Cyber Kill Chain model. It provides examples of using endpoint data to hunt for threats across the kill chain by analyzing processes, communications, and file artifacts in a demo dataset. Advanced techniques discussed include hunting for SQL injection attacks and lateral movement.
You Need An Agent…
20
● Where can you get it?
● Microsoft SysmonTA (App Store)
● Great Blog Post to get you started
● Increases fidelity of MS Logging
● Are there other sources?
● Sure! Carbon Black, Tanium, etc.
● Consider pros and cons
● Test test test!
Blog Post:
http://blogs.splunk.com/2014/11/24/monitoring-network-traffic-with-sysmon-and-splunk/
https://splunkbase.splunk.com/app/2734/
DNS exfil detection – tricks of the trade
üparse URLs & complicated TLDs (Top Level Domain)
ü calculate Shannon Entropy
List of provided lookups
• ut_parse_simple(url)
• ut_parse(url, list) or ut_parse_extended(url, list)
• ut_shannon(word)
• ut_countset(word, set)
• ut_suites(word, sets)
• ut_meaning(word)
• ut_bayesian(word)
• ut_levenshtein(word1, word2)
82.
Examples
• The domain aaaaa.4.com has a Shannon Entropy score of 1.8(very low)
• The domain google.4.com has a Shannon Entropy score of 2.6 (rather low)
• A00wlkj—(-a.aslkn-C.a.2.sk.esasdfasf1111)-890209uC.4.com has a Shannon
Entropy score of 3 (rather high)
Layman’s definition: a score reflecting the randomness or measure of
uncertainty of a string
Shannon Entropy