Cylabs
  • 😊Welcome to CyLabs
  • 101 Series
    • Cyber Security 101
      • Introduction to Cyber Security and core concepts
      • Getting Started into Cyber Security Career
      • Online Cybersecurity Practice Labs to Sharpen Your Skills
      • Cyber Security Interview Q&A
        • Careers in Cybersecurity
      • Stay Tuned : Cyber Resources
        • Blogs for Cyber Security
          • Blogs
            • Penetration Testing Automation
            • Security
              • Metasploit Framework
              • Jenkins Servers: Identifying Vulnerabilities and Exploiting Unauthenticated Access with Groovy Scrip
              • Securing Your Network: Printer Vulnerabilities, LDAP Exploits, and Defense Strategies
              • SSH for Red Teaming and Security Analysis
              • Operating Systems for Penetration Testing: Enhancing Your Cybersecurity Arsenal
              • Hacking Notes
                • Phineas Fisher
        • Cyber News
        • Leading Cybersecurity Companies to follow
        • Cybersecurity Courses and Certifications: Trends in 2024
        • ISACs: Enhancing Cybersecurity through Collaboration and Information Sharing
        • Global and National Cybersecurity Agencies: Guardians of the Digital Realm
        • Cyber Security News Feed Resources
    • Kubernetes 101
    • Web 101
    • Operating Systems
      • Linux 101
        • Linux Kernel
        • Basic Commands and Usage
          • Shell Commands
        • Linux File System
        • apt
        • su and sudo
        • File Search
        • Linux Services
        • Networking
          • Netcat
        • Corn Jobs
        • Shell Scripting
        • Linux OS API's
      • Windows 101
        • Windows system calls
        • Windows Event Logs and IDs
        • Windows UAC
        • Windows Registry
        • Windows Bit Locker
        • Volume Shadow Copy Service
        • Windows OS API's
    • Building the Security Lab
      • Virtualization with Virtual Box
        • Installing and setting Virtual Box
        • Vritual Box Networking
      • Home Lab Setup
        • PF Sense Installation
        • Ubuntu Installation
        • Metasploit Installation
        • Kali Linux Installation
    • Fundamentals of Programming
      • Python 101
      • Powershell 101
      • SQL 101
    • AI/ML and Data Science for Cyber Security and Analytics
    • IT Infrastructure and Hardware
    • Governance, Risk and Compliance
    • Networking 101
      • Network Packets and Frames
      • Network Switches and Routers: The Backbone of Connectivity
      • Network Security Devices and Strategies
      • Network Design and Architecture: A Foundation for Robust Connectivity
      • Specialized Network Equipment and Functions
      • Network Traffic Management and Analysis
      • Advanced Networking Concepts
      • ARP and RARP
      • How DNS, HTTP and HTTPS works
      • Understanding the Basics of Networking
  • Introduction to Cyber Security Operations
    • Security Architecture and Engineering
      • Security Controls
        • Preventive
        • Deterrent
        • Detective
        • Corrective
        • Compensating
        • Directive
    • GRC
      • Information Security and Risk Management
        • Risk Management
        • Supply Chain Risk Management
        • Governance
        • Asset Management
        • Cyber Security Road Map
        • Cyber Security Controls
        • Cyber Security Strategy and Architecture
        • Cyber Security Architecture
        • Risk Assessment and Security Questionnaire
        • Ransomware Prevention
        • Gap Assessment
        • Principle of Least Privilege
      • Governance
      • Asset Security
      • Communication and Network Security
      • Identity and Access Management
      • Security Assessment and Testing
      • Security Operations
      • Software Development Security
      • Security Baselines
      • Security Reporting
      • Data Loss Prevention
      • Zero Trust
      • MFA
      • Compliance
    • Security Policies and Procedures
    • Offensive Security
      • Stages of Penetration Testing
    • Cyber Defense
      • Security Operations Center (SOC)
        • SOC Architecture Development with ELK Stack:
      • Different Classes of Threat Actor
    • Security Principles, Controls and Strategies
      • Defense in Depth
      • Least Privilege
      • Zero Trust
  • Cyber Security Assessment
    • Planning and Scoping
      • Security Engagement
      • Security Assessment Questionaire
      • Who Targeting you
    • Reconnaissance
      • Active Recon
        • Tools
          • NMAP
          • Maascan
          • Recon-NG
          • Maltego
          • Spider Foot
          • Whois
          • TraceRoute
          • Amass
          • The Harvester
          • Nslookup
          • DNS Dumpster
          • BloodHound
          • Relay Attacks
          • Packet Crafting
          • NMAP+Proxychains+TOR
      • Passive Reconnaissance
        • Network Sniffing
          • Wireshark
          • TCPDump
        • Whois (online services)
        • EMail Account Enumeration
          • Hunter.io
        • Search Engine Analysis
          • Google Hacking Database
          • Shodan
          • Censys.io
        • Information Disclousre
        • Banner Grabbing
        • HTML Scrapping
        • Certificate Transparency Logs
        • Open Source Intelligence (OSINT)
          • Ship OSINT
          • Social Media
          • Code Repositories
          • Darkweb Analysis
          • DNS
          • Cached Pages
          • Password Dumps
          • Anonymity
    • Enumeration
      • OS Finger Printing
      • Service Discovery
      • Protocol Enumeration
      • DNS Enumeration
      • FTP Service
      • HTTP/HTTPS
      • WMI
      • DCOM
      • RPC Remote Procedure Call
      • Directory Enumeration
      • Host Discovery
      • Share Enumeration
        • SMB
      • Local User Enumeration
      • Email Account Enumeration
      • SSH Service
      • Wireless Enumeration
        • Wigle.net
        • InSSIDer
        • Aircrack-ng
      • Permission Enumeration
      • Secrets Enumeration
        • Passwords
        • Session Tokens
        • Cloud Access Keys
      • Attack Path Mapping
      • VNC
      • Web Application Firewall
      • Wordpress Scan
      • Remote Desktop Protocol
      • SNMP
      • SMTP
      • Web Crawling
        • Platform Plugins
        • Sitemap
        • Robots.txt
      • Active Directory Enumeration
    • Vulnerability Assessment and Management
      • Terminology
      • Vulnerability Database
      • Vulnerability Scoring
        • CWE
        • CVSS
        • CVE
        • EPSS
      • Vulnerability Scan
        • Authenticated vs Unauthenticated Scans
        • OS Security Assessment
        • Tenable
        • Nikto
        • Open VAS
      • Exploit Databases
      • Tools
        • Tenable.IO
        • Open VAS
    • Exploitation
      • Attack Surface and Target Prioritization
        • High Valued Assets and Identification
        • Vulnerability Metrics
        • End of Life Softwares
        • Default Configuration
        • Running Services
        • Vulnerable Encryption Methods
        • Defensive Capabilities
        • Attack Path
      • Attack Types
        • Network Attacks
          • Virtual LAN Hopping
          • Packet Crafting
            • Attacks Scenario
          • Default Credentials
          • On-Path / Man in the Middle Attacks
          • Certificate Services Attacks
      • Host Based Attacks
        • Privilege Escalation
        • Credential Dumping
        • Shell Escape
        • UAC Bypass
        • Payload Obfuscation
        • Endpoint Security Bypass
        • Process Hallowing
        • Log Tampering
        • DLL Injection
        • Service Path Injection
      • Authentication Attacks
        • LDAP Injection
        • SAML Attacks
        • Open ID Connect Attacks
        • Dictionary Attacks
        • Credential Stuffing
        • MFA Fatigue
        • Pass the Hash attacks
        • Kerberos Attacks
        • Pass the Ticket Attacks
      • Vulnerable Encryption Methods
      • Tools
        • Metsploit
        • Netcat
        • LOLbins
        • Mimikatz
        • Rubeus
        • Certify
        • AD Search
        • Powerview
        • SeaBelt
        • Evil winRM
        • PSEXEC
        • Powersploit
        • Metasploit
        • Impacket
        • Responder
        • CrackMapExec
        • Msfvenom
        • Responder
        • Searhsploit
        • Powersploit
      • Password Attacks
        • Password Cracking
        • Password Spraying
        • Tools
          • Medusa
          • Burpsuite
          • John the Ripper
          • Hydra
          • Hashcat
        • Password Attacks
    • Lateral Movement
      • Relay Creation
      • String Searches
      • Service Discovery
      • Tunneling
        • SSH Tunneling
      • Pivoting
      • Exfiltration
        • DNS
        • HTTPS
        • EMail
        • Cloud Storage
      • Tools
        • sshuttle
        • Page 1
    • Post Exploitation
      • Persistance
        • Scheduled Taks
        • Bind Shell
        • Registry Keys
        • C2 Frameworks
        • Tampering Security Controls
        • Back Door
          • Trojan
          • Root Kit
          • Web Shell
        • Searching Valid Account Credetials
        • New Account Creation
        • Reverse Shell
        • Service Creation
        • Cron Jobs
      • Command and Control
    • Reporting
  • Cybersecurity Frameworks and Standards
    • CREST
    • CIS
    • NIST Publications
      • NIST SP 800-171
      • NIST CSF
      • NIST SP 800-115
    • MITRE
      • MITRE D3FEND
      • MITRE ATT&CK
    • Penetration Testing Execution Standard (PTES)
    • OWASP Top 10
    • Purdue Model
    • Open Source Security Testing Methodology Manual (OSSTMM)
    • Council of Registered Ethical Security Testers (CREST)
    • Zero Trust
    • CMMC
    • Threat Modeling Frameworks
      • STRIDE
      • OCTAVE
      • DREAD
    • Mitigation Strategies
      • Network Segmentaion
      • Access Control
      • Application Control
      • Isolation Techniques
      • Default Password Changes
      • Host based firewall
      • Protocol blocking
      • Port blocking
      • Host based intrusion prevention
      • Endpoint Management
      • Decommissioning
      • Configuration Management
      • Least Privilege
      • Logging
      • Monitoring
      • Encryption
      • Patching
    • Security Governance
      • Data and System: Roles and Responsiblities
      • Security Policies
        • Access Use Policy
      • Security Standards
        • Access Control
        • Encryption
        • Password
      • Security Procedures
        • Change Management
  • Security Domains
    • Security Designing
    • Application Security
      • Cryptographic Attacks
      • Password Attacks
      • Web Application Security
        • Enumeration
          • Cookie and Header Security Review
        • Bruteforce Attack
        • Directory Traversal
        • Insecure Direct Object Reference (IDOR)
        • Session Hijacking
        • File Inclusion Attacks
          • LFI
          • Webshell
          • RFI
        • Server-Side Request Forgery (SSRF)
        • Deserialization Attacks
        • Command Injection
        • Server Side Template Injection
        • Cross Site Scripting (XSS)
        • SQL Injection
          • Union Based SQL Injection
          • Blind SQL Injection
        • Cross-Site Request Forgery (CSRF)
        • XML External Entity (XXE)
        • File Upload Vulnerabilites
        • Remote Code Execution (RCE)
        • Tools
          • Hetty
      • OWASP TOP 10 API
        • API Abuse
        • JWT Token manipulation
        • Graph QL security
        • API security
      • OWASP Top 10 Mobile
      • OWASP Top 10 IOT
      • Web Application Security
        • Getting Started in BugBounty Hutning
        • Subdomain Enumeration
        • Subdomain Takeover: Understanding the Risks and Prevention
        • Tools and Technologies
      • Microservices
      • WPscan
        • Burpsuite
        • Ffuf
        • Gobuster
        • Postman
        • Dirbuster
        • Wfuzz
        • ZAP
      • Tools
        • BurpSuite
        • SQLmap
    • Cloud Security
      • Metadata Service Attacks
      • IAM misconfigurations
      • Tools
        • Pacu
        • Prowler
        • Scoutsuite
        • Docker Bench
      • Container Escape
      • Workload Runtime Attacks
      • Supply Chain Attacks
      • Misconfigurations
        • Network Segmentation
        • Network Controls
        • IAM Credentials
        • Public Access to Services
        • Exposed Storage Buckets
        • Logging Information Exposure
      • Azure Security : Components and Assessment Guide
        • Azure Security Assessment Tools : Installation and usuage
    • Identity and Access Management
    • Cloud Security
      • Cloud Engineering and Architecture concepts
      • Cloud Data Security
      • Cloud Platform and Infrastructure Security
      • Cloud Application Security
      • Cloud Security Operations
      • Cloud Legal, Risk and Compliance
      • Azure Security
      • Azure Pentest
    • DevSecOps
      • Static Application Security Testing (SAST)
        • Code Quality
        • CheckMarx
        • Sonarqube
          • Sonarqube Installation using Helm Chart on AKS
      • Interactive Application Security Testing (IAST)
      • Dynamic Application Security Testing (DAST)
      • SCA
      • Wazuh SIEM and XDR
        • Wazuh on Azure AKS
        • Azure + Argo
      • DevSecOps
    • Social Engineering
      • Vishing
      • Spearphishing
      • Smishing
      • Eavesdropping
      • Impersonation
      • Watering Hole
      • Shoulder Surfing
      • Whaling
      • Phishing
      • Tools
        • GoPhish
        • Beef
        • Evilginx
        • SET social engineering toolkit
    • DevOps
      • Kubernetes
        • Kubernetes Architecture and Components
        • Mastering kubectl: The Command Line Interface for Kubernetes
        • Overview of Kubernetes Tools and Utilities
        • Container vs Pod vs Deployment
        • Kubernetes and Docker Swarm
        • Deploying a Kubernetes Cluster Using Minikube
        • Deploying a Kubernetes Cluster Using Kind
        • Integrating Kubernetes with Azure Key Vault
        • Containers vs Virtual Machines
        • Comprehensive Guide to Kubernetes Security and Analysis Tools
        • Monitoring Kubernetes with Prometheus and Grafana
        • Introduction to Azure Kubernetes Service (AKS) and Deploying Your First Cluster
        • Kubernetes Persistence with Backend Databases
        • Kubernetes StatefulSet vs. Deployment
        • DevSecOps Architecture for Kubernetes
      • Docker
      • Helm
        • Scenario : Configuring Azure Key Vault and Using Secrets in Helm Deployments
      • Git Ops
        • Argo CD
      • Git and Versioning
      • Terraform
      • Virtualization
    • Mobile Security
      • Android Mobile App Security Assessment
      • Suspicious Malware App Analysis
      • Android App Penetration Testing
      • Permission Abuse
      • Jailbreak/Rooting
      • Tools
        • MobSF
        • Drozer
        • Frida
    • IOT/OT/SCADA
      • Power Supply
        • Juice Jacking
      • RFID
      • Bluetooth
        • BlueJacking
        • Bluetooth Spamming
      • Ports and Services
      • Port Mirroring
      • Modbus Attack
      • CAN Bus Attack
      • Replay Attack
      • Memory Registry Attacks
      • Tools
        • BlueCrack
        • Scapy
        • TCP Replay
    • Network Security
      • Network Attacks
        • DNS Attacks
        • DDOS
      • Network Assessment
      • Wireshark
      • Zeek
      • Snort
      • TCPDump
      • Defensive Network
        • Firewalls
        • Intrusion Detection System
    • Wireless Attacks
      • Service Set Identifier (SSID)
      • Wardriving
      • Evil Twin Attack
      • Deauthentication Attacks
      • Signal Jamming
      • Channel Scanning
      • Signal Strength Scanning
      • Tools
        • WiFi Pumpkin
        • AirCrack Ng
        • Kismet
    • Purple Teaming
      • Tools
        • Infection Monkey
        • Atomic RedTeam
        • Caldera
    • Kubernetes Security
      • AKS Security
      • Kube-Hunter
      • KubeEscape
    • Hardware Security
    • Container Security
      • Grype
      • Trivy
      • Clair
    • AI
      • LLM (Large Language Models)
      • Prompt Engineering
      • AI Cyber Security Risk Management
        • AI Policies
      • AI Security
      • AI Attacks
        • Prompt Injection
        • Model Manipulation
      • Security Frameworks
        • MITRE ATLAS
        • OWASP Top 10 LLMs
        • NIST AI Risk Management Framework
    • Reverse Engineering
      • Scenarios
        • Browser Plugin
        • PDF document
        • Word Doc
        • Windows Binary File
        • Mobile App
      • Buffer Overflow
  • Operational Security
    • Identity and Access Management
      • Identity
      • Authentication
      • Accountability
      • Access Management
      • Authorization
      • Access Controls
    • Deception Technology
      • Honeypot
      • Honeynet
      • Honeyfile
      • Honey Token
    • Cryptography
      • Data at Rest
      • Data at Transit
      • Hashing
      • BlockChain
      • Digital Signatures
      • Certificates
      • Encryption
        • Public Key Infrastructure (PKI)
          • Public Key
          • Private Key
        • Tools
      • Certification Preparation
        • Penetration Testing
        • GRC and Audit
    • File Integrity Monitoring
    • Data Security
      • DLP
    • Change Management
      • Impact Analysis
    • Malware Analysis
      • Malware Analysis Tool
      • Malware Analysis Books
      • university courses and resources related to malware analysis
      • Binary Analysis
    • Data Loss Prevention
    • Threat Modeling
      • Attack Surface Management
        • Introduction
      • Threats, Technologies, Procedures
        • Threat Actors
      • Threat Hunting
        • Indicators of Compromise
      • Threat Assessment
        • Threat Modeling
          • OCTAVE
          • DREAD
          • STRIDE
        • Threat Hunting
          • Threat Hunting Blogs
          • Ransomware: An Overview
          • Threat Hunting and Incident Response Q&A
          • Network Traffic Analysis: Wireshark
          • Threat Hunting Questionnaire
          • KQL
          • Email Header Analysis
          • TH
          • Windows Process Exploration
        • Threat Intelligence
          • Threat Intelligence Tools and Techniques
            • Yara
      • Malware Attacks
    • Digital Forensics
      • Network Forensics
      • Forensic Tool Analysis
      • Data Recovery
    • Endpoint Management
    • SOC/SOAR
      • Threat hunting scenarios
      • Log Management
        • AWS VPC flow log analysis
        • Linux Logs
        • Windows Logs
    • Ransomware Prevention
      • APT Groups
    • Security Automation
      • C
      • Powershell
      • Python
      • C++
      • GO
      • Rust
    • Incident Response
      • Scenarios
        • Windows : No Event Logs
      • Tools
        • Chainsaw
    • Defensive Security Controls
    • Physical Security
      • Physical Attacks
        • USB (Universal Serial Bus)
        • Tailgating
        • Lock Picking
        • RFID Cloning
          • Badge Cloning
    • Personal Security
    • Security Awareness and Training
    • Firewall
    • Network Access Control
    • Intrusion Detection System
    • Intrusion Prevention System
    • Operating System Security
    • Secure Protocol Usuage
    • Business Continuity
    • Email Security
    • DNS Filtering
    • user behaviour analytics
    • Host Security
    • Mobile Device Security
    • Change Management
    • Vulnerability Management
      • Vulnerability Assessment
        • Vulnerability Analysis
      • Types of Vulnerabilites
    • Penetration Testing/Red Teaming
    • Disaster Recovery
    • Logging and Monitoring
      • Monitoring
        • Systems
        • Infrastructure
        • Applications
      • Logging
        • Log Data
          • Application Logs
          • Network Logs
          • WAF Logs
          • IDS/IPS logs
          • OS logs
          • Endpoint Logs
          • Firewall Logs
        • Alerting
        • Log Aggregation
      • Tools
    • Endpoint
    • Security Metrics
  • Industry Specific Security:Case Studies
    • Aviation Security
      • The Integral Role of Airports in National Security : Operations Perspective
      • Cyber Attacks on Airports
      • Navigating the Complex Web of Airport Operations: Key Components and Leading Industry Providers
    • Aviation Security
  • Computational Science
    • Quantum Computing
      • Quantum Computing: Unleashing the Power of Qubits
    • Probability
  • Data Engineering
  • AI/ML and Data Science
    • Installation
      • Ollama
    • Machine Learning
    • Large Language Models (LLM)
    • Security Analytics
    • Untitled
      • Roles and Responsibilites
      • Azure AI Services
        • AI Services Security
        • Monitoring Azure AI Services
        • AI services on containers
  • Application Development
    • Django
  • Radom Topics :)
    • CSA WAI
  • CISSP
Powered by GitBook
On this page

Was this helpful?

  1. Operational Security
  2. Threat Modeling
  3. Threat Assessment
  4. Threat Hunting

TH

Threat hunting

  • Organization mission

  • Threat Actors targeting Aviation Industry

  • What are the critical assets and businesses

  • Who targeting DFW Airport

  • Do any third party companies targeted in process of attacking us

  • Which exploits are used for attacks

  • Which APT targets us

  • Hypothesis

    • AISAC and recent TTP's and cyber attacks

    • Blind spots in organization

    • Tools and techniques used by Threat Actors

    • Data infiltration and Exfiltration Techniques

    • IOC's and adversary TTP's

    • Investigate

      • TTPS

      • Analytics

  • Creating threat detection rules

  • Collecting Malware Samples and fetch new patterns and TTP's

  • Getting alerts to Incident Response

  • Security Analytics and

Before starting Threat Hunting

Which Threat Actors targeting

  • Aviation ports

  • Airline, Transport Industry

  • Geo Political

Focus on attack techniques

Focus on critical assets and information

  • Crown Jewels Analysis (CJA)

Threat hunting Models/Framework

  • Diamond Model of Intrusion Analysis

  • MITRE ATTACK

  • BAS Threat Library (picus)

List of threat hunting tools

  • Data sources from MITRE attack

  • Data visibility

  • Historical data for threat hunting

  • Threat Hunting Maturity Model breach attack simulation model

  • Sqrrl

Know thy self

  • Reconnaissance

  • Osint

  • Asset inventory

  • Network segmentation

  • Patching

  • Backup

Pyramid of pain

Threat hunting

  • Start with applications

  • Browser plugins

  • System level event

  • Host perimeter

  • Edge firewalls

Tools

  • Phishing catcher

  • Dnstwist

  • Gnuplot

  • Apiify

  • Query isc api for IP based threat intel

  • Domain_Stats from sans

Cloud attacks

  • Need to implement logging

  • Password spraying

  • One dirve log analysis

  • Cloudtrail logs

Know normal

  • Local users

  • ASEP's entry points

  • Trusted Root certs

  • Entropy in filenames

  • Entropy in dns

  • Freq in dns and filenames

  • Services

  • Open ports

  • In and outbound communication

  • Arp entries

  • Software installed

  • Processes

  • Authorized hosts files

  • Host file

  • DNS and IP

  • Same first name and last name and sender email address changed

  • Email forwarding rules

  • User at risk

  • Sign in infected device

  • Sign in from unknown location

  • Understanding user privileges

  • Singn in anonymous vpn, tor,

  • Dropbox kind of tool communication

  • Use of I2p, Tor, socks

  • Slow in application performance

  • Autstart program and scripts

  • Unique processes

  • Host

    • profiling by segments

    • profiling by zones

      • Windows servers

      • Linux servers

      • Developers

      • Testing team

      • Database team

      • HR ateam

      • Procurement team

      • Legacy systesm

      • PCI environment

      • Extranet

      • Network team

      • Production

      • Dev

      • Tst

      • PCN/SCADA/IOT/OT

      • High value/business critical

      • Process injection attempts

      • DLL sideloading

      • File deletes

      • Hunting Powershell Obfuscation with Linear Regression

    • Network

      • Site to site vpns

      • Long connections

      • Vpn acitivity

      • Beaconing activity

    • Jpcertcc.github.io

    • Dnsespinoge

    • DNSSEC

    • Security trails dns change

    • Domain fronting

    • National cyber security centere TLS interception

    • RITA TLS interception

    • Recursive dns name servers

    • Authorative dns name server

  • Tools

    • ELK

    • OS Query

    • Fleet Kolide

    • Powershell Kansa

  • Seen first time

    • File names

    • Processes

    • Processes had a file

    • Processes running from main memory

    • Most common and most rare

      • Files

      • Processes

      • Applications

      • registries

      • Ip's

      • Dns

      • Domain

      • Email sender

      • Wmi commands

      • Powershell

      • Users

      • Groups

      • Ports

      • Services

    • Signals

      • Account discorvery

      • Account creation

      • Account modification

      • Clearing logs

      • Process from ZIP file

      • Link file execution

      • Iso file execution

      • Modification of autorun key

      • Modification of registry key

      • Autoruns directory

        • Parent location of autoruns

        • Enabled autoruns

        • Disabled autoruns

        • Autoruns by catetory

        • Unknown signer autoruns

        • Autoruns from

          • Exe

          • Dll

          • Vbs

          • Ps1

          • Sys

          • Drv

          • Ax

          • cpl

      • Execution from temp directory

      • File name /process name with random letter

      • Webshells

        • W3wp.exe

        • Php-cgi.exe

        • China chopper

      • Shimcache hunting

      • Top executions by endpoint

      • Lowest execution by endpoint

      • Single character binaries

      • Execution form temp

      • Suspicious binaries

      • Total unique applications

      • Hunting with yara

        • Loki ioc scanner

      • Threathunter playbook

        • Cyberdog

        • OTRF

  • Honey tokens

    • Spn's

    • Credentials

    • Files

    • Folders

    • User-agents

Tools

C:\Windows\system32\cmd.exe /C whoami /groups C:\Windows\system32\cmd.exe /C tasklist /v C:\Windows\system32\cmd.exe /C netstat -na | findstr "EST" C:\Windows\system32\cmd.exe /C systeminfo C:\Windows\system32\cmd.exe /C ipconfig /displaydns C:\Windows\system32\cmd.exe /C wmic /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathtoSignedProductExe wmic /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathtoSignedProductExe netstat -an net user net use net view /all netstat -an net user net use net view /all net view /all /domain cmd.exe /c "reg.exe save hklm\security c:\windows\temp\xqjxxkmbrx" reg.exe save hklm\security c:\windows\temp\xqjxxkmbrx cmd.exe /c "reg.exe save hklm\system c:\windows\temp\kjmohmuk" reg.exe save hklm\system c:\windows\temp\kjmohmuk cmd.exe /c "reg.exe save hklm\sam c:\windows\temp\emmbnafzjtwq" reg.exe save hklm\sam c:\windows\temp\emmbnafzjtwq net share C:\Windows\system32\net1 share net config workstation C:\Windows\system32\net1 config workstation net group "Domain Admins" C:\Windows\system32\net1 group "Domain Admins" route print net localgroup C:\Windows\system32\net1 localgroup ipconfig /all tasklist /V net share C:\Windows\system32\net1 share net config workstation C:\Windows\system32\net1 config workstation net group "Domain Admins" C:\Windows\system32\net1 group "Domain Admins" route print net localgroup C:\Windows\system32\net1 localgroup ipconfig /all tasklist /V net config workstation C:\Windows\system32\net1 config workstation nslookup -type=any %%userdnsdomain%% net config workstation C:\Windows\system32\net1 config workstation nslookup -type=any %%userdnsdomain%%

C:\\Windows\\system32\\whoami.exe" /user

C:\\Windows\\system32\\whoami.exe" /groups

"C:\\Windows\\system32\\net.exe" group "domain admins" /domain

netstat • net view • net use • net session

nltest /domain_trusts /all_trusts

whoami /upn

netsh firewall set opmode disable net stop security center net stop WinDefend

\"C:\\Windows\\System32\\cmd.exe\" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete &; bcdedit /set {default} bootstatuspolicy ignoreallfailures &; bcdedit /set {default} recoveryenabled no &; wbadmin delete catalog -quiet vssadmin delete shadows /all /quiet wmic shadowcopy delete bcdedit /set {default} bootstatuspolicy ignoreallfailures bcdedit /set {default} recoveryenabled no wbadmin delete catalog -quiet

adfind -f objectcategory=computer -csv name cn OperatingSystem dNSHostName > some.csv"

adfind -gcb -sc trustdmp > trustdmp.txt

  • Unauthorized RDP connections

  • Failed RDP attempts

  • Persistent connections

  • Longest connections

  • Beacon connections detection, may connection repeatatively

  • What is the operational and business needs for the connections

  • Protocol usage

  • Abnormal protocol usage

  • IP reputation check

  • C2 beacon detection

  • C2 long connections , 5 hours

  • C2 behind the CDN

  • Zeek+ja3

  • Self signed cerificates

  • Teamviewer connection

  • Certificate analysis

  • Detection of tunneling

  • Rare useragents

  • Destination IP lookup

    • IP reputation

    • ASN

    • Whois

    • Geo location

    • Ptr records

  • Abuseipdb

  • Alienvault

  • Censys.io

  • Dns.google/query?name

  • Onyphe.io

  • Security trails

  • Shodan

  • virustotal

  • Executions of cobaltstrike payload

  • Data exfiltration

    • 7zip

    • Mega

  • Using PsExec

  • Most common protocol usage

  • suspicious IP/Domains lookup with Alexa/Cisco million domains list (need to use automation script)

  • Investigate suspicious domain certificates to find similar malicious or impersonating domains

  • Disabling the endpoint security events, script execution activity (ex: PS, JS, DLL followed by download activity)

  • .rdp files in environment

  • .hta files in environment

  • .iso files in environment

  • .ink files in environment

  • Passwords.txt in environment

  • Network Recon Activity

    • Using windows utilities

  • Password Dumping activity tools

    • Mimikatz

    • Lass.exe dumping

  • Additional tools

    • Lazangne

    • RDPV

    • NirSoft Tools

  • Network port scan activity

  • windows utilities such as WMI, wmic, taskkill, WEVTUTIL, sc, net.exe to kill processes and remove logs from the system

  • Utilman.exe to manipulate/disable cmd.exe

  • writing a rule to detect findstr.exe

  • Hunting for password protected zip files ( need to check possibilities)

  • WScript to downloading files

  • DLL dropping in %appdata% with different file format

  • Regsrv32 loads DLL

  • Ping beaconing/ICMP

  • VNC protocol usage

  • RDP protocol usage connections to and from public IP range

  • FTP protocol usage

  • Detecting Cobalt Strike activity

  • Powershell download (invoke-webrequest)

  • Persistence using schedule task

  • wermgr.exe process injection

  • Svchost.exe process injection

  • ARP for enumeration

  • Word document with macro

Kenny addition(Feel Free to Delete):

  • Check LastPass Use

  • Check robots.txt

  • Check Cookies storage

VPN's

  • Compromising VPN services

  • Brute forcing VPN services

  • User Sign In activity Bruteforce/impersonation attacks

  • Zero-Day and vulnerability attacks on VPN services

Threat Hunting for Log4J exploitation:

Tools:

Arctic Wolf Tool

ToDo :

PaloAlto Useragent search

Verify the attack simulation :

Packet capture capabilities from Paloalto firewall

Initial Access :

  • SocGholish (delivered via injected JavaScript on compromised websites.)

Execution :

  • Upon downloading malicious windows executable file executed by following -k and -pass

  • Use of PsExec to push out ransomware

  • Wipes the recycle bin folder of every drive

  • Deleting shadow copies (local backups) by first listing them using WMI query SELECT * FROM Win32_ShadowCop

  • Encrypts network shares and Exchange Mailbox if set in its configuration flag

  • Uses pointed files when encrypting .lnk files

Persistence :

  • LockBit 3.0 is capable of injecting a DLL into memory via reflective loading

  • drops an .ico file in the %PROGRAMDATA% folder

  • Disabling of Windows Defender and additional security controls (third party antivirus/endpoint solutions)

  • Establishing persistence to run Cobalt Strike beacon.

Information Gathering :

  • specific PowerShell scripts containing two layers of obfuscated code

  • Use of information gathering tools such as Bloodhound and Seatbelt.

Privilege escalation :

  • UAC (user account control) bypass

Lateral Movement :

  • Lateral movement leveraging RDP and Cobalt Strike.

  • lateral movement through a group policy update, as long as there is a -gspd parameter provided

Exfiltration:

  • Use of 7zip to collect data for exfiltration.

  • Exfiltration of data to Mega[.]nz

Clearing Tracks :

  • drops and executes a .tmp file decrypted from the binary, instead of using cmd.exe

Remediation :

Best practices for mitigating the risk of a ransomware attack include[1]:

  • Following the 3-2-1 rule, which involves backing up files in three copies in two different formats, with one copy stored off-site. This is a precautionary measure to avoid data loss in case of a ransomware attack.

  • Remaining vigilant against socially engineered emails to reduce the risk of a ransomware infection, as ransomware is commonly spread through malicious spam email attachments.

  • Keeping applications and programs up to date. Regular patching ensures that software vulnerabilities that ransomware actors could exploit as entry points can be addressed in a timely fashion.

  • Organizations can benefit from a multilayered approach that can help guard possible entry points into a system (endpoint, email, web, and network).

Comments :

  1. There are similarities between black matter ransomware and lockbit3.0

References for TTP’s :

Security Vendors Analysis Report:

References:

Malware Families

  • Beacon

  • SystemBC

  • Metasploit

  • HiveLocker

  • Qakbot

  • ALPHV

  • LOCKBIT

  • BASTA

Phishing

  • Qbot

  • Emotet

  • Iced ID

  • Bumblebee

  • Phosphorus

  • ursnif

Drive by Download

  • Gootloader

  • Zloader

Other Attack Scenarios:

  • SEO Poisoning

Bruteforce

  • RDP

  • SQL server

Ransomware :

  • BlackByte ransomware

  • Royal Road Weaponize

  • LockBit 3.0 ransomware group

  • BianLian ransomware

  • Medusa

  • Conti

  • Sodinokibi

Recon Tool

  • Dragon Juice

  • TankTrap powershell utility

Info stealer:

  • Form Book

Darkweb:

  • Breach forums

Vulnerabilities

  • Exchange : Proxy shell

  • Manage engine support center plus

  • CVE-2020-1472 (Zerologon) and CVE-2021-44077 (referring to ManageEngine SupportCenter Plus)

Suspicious execution:

  • PowerShell execution

  • WMI

  • Windows commands

  • Service execution

  • Scheduled Task

  • Malicious link from documents

  • COM execution

Remote Access

  • AnyDesk

  • Tactical RMM

  • Atera

Using run keys for persistence

App data folder with DLL files

Run Key to execute a PowerShell script via a LNK file

Scheduled Tasks to execute their payloads

IIS webshell

Process injection scenario

DLL Injection

Valid accounts misuse

IOC's

Abush.ch

IP assigned to ORG

IP Lookup

Publicly exposed assets

Url Scan

Sandbox

Forensicdots.de/dotspotter

Malapi.io

Urlscan.io

Publicwww.com

Osinttechniques.com

Malpedia

Objective-see.org

Hijacklibs.net

Lolbas-project.github.io

Gtfobins.github.io

Lots-project.com

Mxtoolbox super tool

Malshare.com

Abuse.ch

Virustotal.com

OSINTCurio.us

PreviousEmail Header AnalysisNextWindows Process Exploration

Last updated 1 year ago

Was this helpful?

Adfind

CCSS Forum (), and URLHaus ()

http://www.joeware.net/freetools/tools/adfind/
https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/
https://awakesecurity.com/blog/threat-hunting-for-log4j-exploits-on-the-network/
https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/
https://www.paloaltonetworks.com/blog/security-operations/hunting-for-log4j-cve-2021-44228-log4shell-exploit-activity/
https://www.crowdstrike.com/blog/how-to-baseline-and-hunt-log4shell-with-the-crowdstrike-falcon-platform/
https://blogs.opentext.com/log4j-vulnerability-explained-and-how-to-respond/
https://github.com/rtkwlf/wolf-tools/blob/main/log4shell/README.md
https://www.msspalert.com/cybersecurity-news/log4j-vulnerability-scanners-and-detection-tools-list-for-mssps-and-threat-hunters/
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/objects/objects-security-profiles-url-filtering/url-filtering-settings.html
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0
https://www.virustotal.com/gui/file/c597c75c6b6b283e3b5c8caeee095d60902e7396536444b59513677a94667ff8/detection
https://app.any.run/tasks/837578ac-093b-4df2-85fc-aa08738d3dce/
https://www.trendmicro.com/en_us/research/22/g/lockbit-ransomware-group-augments-its-latest-variant--lockbit-3-.html
https://www.nozominetworks.com/blog/blackmatter-ransomware-technical-analysis-and-tools-from-nozomi-networks-labs/
https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/
https://blogs.vmware.com/security/2022/10/lockbit-3-0-also-known-as-lockbit-black.html
https://wazuh.com/blog/detecting-lockbit-3-0-ransomware-with-wazuh/
https://www.sentinelone.com/labs/lockbit-3-0-update-unpicking-the-ransomwares-latest-anti-analysis-and-evasion-techniques/
https://alparslanakyildiz.medium.com/malicious-file-document-analysis-285654e5a59e
https://medium.com/walmartglobaltech/reverse-engineering-an-obfuscated-malicious-macro-3fd4d4f9c439
https://www.picussecurity.com/resource/blog/emotet-technical-analysis-part-1-reveal-the-evil-code
https://tech-zealots.com/threat-lab/deobfuscating-emotet-vba-macro-like-a-pro/
https://otx.alienvault.com/
https://virustotal.com
https://bgp.he.net/
https://ipinfo.io/
https://whatismyipaddress.com/
https://www.showmyip.com/
https://dnsdumpster.com/
https://crt.sh
https://censys.io
https://Urlscan.io
https://www.spamhaus.org/
https://www.ccssforum.org/
https://urlhaus.abuse.ch/
https://www.virusbulletin.com/
Browserling – Online cross-browser testing
Logo