NotHackingYou wrote: » Hunting is all about detection. What you learn when you forensically examine a machine should feed your threat hunting. It's a circle. Hunting is designed to find bad things. Examining the bad things fuels your hunting. To be more prescriptive, I suggest digging deep into common protocols and how those could be abused and then moving on to a deep understanding of the typical attack vectors. I suspect you already have a detailed knowledge here. To apply this knowledge in an active, aggressive fashion designed to detect and disrupt an attacker in real time is threat hunting. I like to start with examining dropped network traffic, DNS logs, and Windows logs.
mactex wrote: » Threat Hunter also (one of my hats). Agree with all NotHackingYou stated, and will add that typically you are trying to detect adversaries on your network that your security tools can not. With that; you need a strong understanding of systems and protocols that are most vulnerable, or where Security has the least visibility in your environment. For most; that is network protocols and Unix/Linux IMO.
mactex wrote: » Or, if a GSE posts in your thread; listen to what they say.
the_Grinch wrote: » SEC511 is the course to take if you can get it paid for. All about hunting threats!
u1tras wrote: » Thank you very much LionelTeo for your post! I'm starting to understand what is threat hunting about. I definitely interesting in the 2nd 'type' of threat hunting which you mentioned. I'll carefully examine all your links. If you don't mind I'll pick up some quotes from your post and ask more granular questions. "Based on my experience, the information source would usually derive from the following" - can TI act as a source for threat hunter? I'm trying to understand how is crucial to know TI for threat hunter, at least in the beginning of the path.
u1tras wrote: » "The second hurdle is to have the necessary skills and environment to be able to look up to 30-90 days of logs" - is it SOC analyst's job or something different? I'm kind of Red teamer and can be confused in blue team terms.
u1tras wrote: » "You had to be comfortable with developing content detection on the tool you are using" - is it about creating new signatures for Snort/Bro, YARA rules, knowing what and how to search in ELK/Splunk etc?
u1tras wrote: » And one more question - should I know IR/forensics domains or my task is only to find compromises and let IR/forensics guys to do their job?
LionelTeo wrote: » Your main goal as a threat hunter is not to find a compromise, as there is just that little amount of compromise you can possibly find in your environment if it is properly secured. A threat hunter goal to identify visibility gaps gathered from the threat hunt sources that are incorporated into the threat hunting operation model, then follow up creating the detection to address the visibility gaps.
u1tras wrote: » LionelTeo, but how many environments are properly secured? It's very interesting actually, because I thought that threat hunting is primarly about finding an adversary's signs in an environment. And maybe other tasks, but only after the primary one. SANS teaches us that: 1. Chances are very high that hidden threats are already in our organization. 2. Our controls alone are insufficient. 3. We don't have to wait but to constantly look for intrusions and catch them in progress. 4. Threat hunters focustheir search on adversaries who are alreadywithin the networks and systems. etc etc So, I'm a little bit confused with it
u1tras wrote: » Thanks LionelTeo, I understood you. I imagine what trainings/tools/skills should I learn for "finding an adversary" part of threat hunting. Can you recommend any learn options for "identifying visibility gaps" part? Maybe some SANS trainings or other (if it exists at all)? Seems like ELS THP and SEC511 previosly mentioned here definitely not about it.