Home

Awesome

BlueSpace2021 header

<p align='center'> <a href="https://twitter.com/Ch33r10"><img height="30" src="https://github.com/ch33r10/BlackHatAsia2020/blob/master/img/twitter%20blue%20logo.png"></a> <a href="https://www.linkedin.com/in/xena-olsen/"><img height="30" src="https://github.com/ch33r10/BlackHatAsia2020/blob/master/img/linkedin%20logo.png"></a> </p> <h3 align="center">PAINT IT, BLUE Slides - <a href="https://github.com/ch33r10/BlueSpace2021/blob/main/rock/Talk_2021_Paint_it_Blue.pdf">Link</a></h3> <p align="center">Pro Tips on transitioning from CTI to Hunt</p> <hr></hr> <p><h1 align="center">🎸<b>RESEARCH</b></h1></p> <p></p> <h3 align="left">πŸ₯<b>GOAL = ASK BETTER QUESTIONS</b></h3>
SOCIAL MEDIA & MORESANSWORKSHOPS / TALKSDISCORDS / SLACKS
#HuntingTipOfTheDay, Follow Threat Hunting Accounts EVERYWHERE - <a href="https://twitter.com/i/lists/1445402146434867206">Link</a>Reading Room - <a href="https://www.sans.org/white-papers/">Link</a>, Webcasts - <a href="https://www.sans.org/webcasts/">Link</a> & Threat Hunting SummitPrioritize Threat Hunting Talks/Workshops & take a look at YouTubeJoin Slack/Discord related to infosec (BlueSpace has a Discord Channel - <a href="invite.gg/bluespace">Link</a>)
<p></p> <h3 align="left">πŸ“<b>CH33R10'S TALK NOTES EXAMPLE</b></h3> <sub>I have a folder where I create a document for each conference. I list the name of the talk or workshop and while watching I will take screenshots, if it is allowed, of the slides and make notes that I can reference later. Any words in the slides that I want to makes sure are searchable, I will type the keywords below the slides. I grab whatever links the speaker(s) share that I can. I make sure to highlight my personal takeaways or takeaways that I feel could be valuable for someone else. I make a point to include things I am curious about regardless of how weird/off-the-wall/impractical my questions/thoughts may be.</sub> <p></p> TEXAS CYBER SUMMIT 2021 <ul> <li>Becoming a Threat Hunter: This Is One Way by Jason Wood - <a href="https://youtu.be/na1PBrWvJjY">Link</a></li> <ul><li><B>LINKS</B></li></ul> <ul><ul><li>Crowdstrike Global Threat Report 2021 - <a href="https://www.crowdstrike.com/resources/reports/global-threat-report/">Link</a></li></ul></ul> <ul><ul><li>Crowdstrike Threat Hunting Report 2021 - <a href="https://www.crowdstrike.com/resources/reports/threat-hunting-report-2021/">Link</a></li></ul></ul> <ul><ul><li>Detection Lab by Chris Long - <a href="https://github.com/clong/DetectionLab">Link</a></ul></ul></li> <p></p> <ul><li><B>TALK TAKEAWAYS</B></ul></li> <sub>I took a screenshot of Jason Wood's slide for my personal notes that I retyped below. These are his words on the slide that I duplicated. All credit for the words on the slide goes to Jason Wood. This duplication is for educational purposes.</sub><p></p> <ul><ul><li>Document your Practice</ul></ul></li> <ul><ul><ul><li>Record videos and publish them</ul></ul></ul></li> <ul><ul><ul><li>Write up your learning experience</ul></ul></ul></li> <ul><ul><ul><li>Give a conference presentation</ul></ul></ul></li> <ul><ul><ul><li>Document how you hunt at work</ul></ul></ul></li> <ul><ul><ul><ul><li>Don't publish external. Keep it inside your employer</ul></ul></ul></ul></li> <ul><ul><ul><li>Benefits of documenting</ul></ul></ul></li> <ul><ul><ul><ul><li>Helps you talk about it in interviews</ul></ul></ul></ul></li> <ul><ul><ul><ul><li>Can talk about how you've applied it at work</ul></ul></ul></ul></li> <p></p> <ul><li><B>Ch33r10's RANDOM THOUGHTS & QUESTIONS</B></ul></li> <ul><ul><li>I wonder if it is possible to use Chris Long's Detection Lab with the tools shared in the Busting the Ghost in the Logs talk by Randy Pargman & Jean-Francois Maes during Texas Cyber Summit 2021 - <a href="https://youtu.be/bTU5xTIXoI4">Link</a></ul></ul></li> <ul><ul><li>I wonder how Chris Long's Detection Lab compares with Splunk's Attack Range</ul></ul></li> <ul><ul><li>I wonder how I can take my threat hunting practice to the next level and make my practice more organization relevant, such as tooling, telemetry, honeypots? etc</ul></ul></li> <ul><ul><ul><li>I wonder if it is possible to obtain a researcher/academic license for [your organization's EDR solution/a popular EDR solution] and build a custom tailored threat hunting lab</ul></ul></ul></li> <ul><ul><li>For organizations that do not use Sysmon/Windows Events, how can I build threat hunting experience?</ul></ul></li> <ul><ul><li>ETC</ul</ul></li> </ul> <p></p> <p><h1 align="center">🎀<b>PRACTICE</b></h1></p> <p></p> <h3 align="left">🎡<b>GOAL = PREPARATION</b></h3>
TRAININGS / HANDS-ONGIVE A TALKHUNT HYPOTHESIS DEVWORK PROJECTS
Boss of the SOC (BOTS) - <a href="https://live.splunk.com/splunk-security-dataset-project">BOTS v1</a>, <a href="https://events.splunk.com/BOTS_2_0_datasets">BOTS v2</a>, <a href="https://www.splunk.com/en_us/blog/security/botsv3-dataset-released.html">BOTS v3</a>, ATTACK Range - <a href="https://github.com/splunk/attack_range">Link</a>, SPLUNK, <a href="https://conf.splunk.com/">.conf</a> Talks, SPLUNK <a href="https://www.splunk.com/en_us/about-us/events.html">Workshops</a>Talk about something HUNT adjacentRead Threat Reports & Think about how YOU would HUNT it, Understand the Technical Attack ChainVolunteer to work SOC tickets, Volunteer to prep CTI reports for HUNT/PURPLE
<p></p> <h3 align="left">βš”οΈ<b>CH33R10'S HUNT HYPOTHESIS DEV</b></h3> <ol> <li><b>WHAT WOULD THIS BADNESS LOOK LIKE?</b></li> <li><b>WHERE WOULD I FIND IT?</b></li> <li><b>HOW DO I DO THE NEEDFUL?</b> (What's that search gonna look like?)</li></ol> <p></p> <p><h1 align="center">πŸ“»<b>APPLY</b></h1></p> <h3 align="left">🎹<b>GOAL = APPLICATION</b></h3>
MITRE ATT&CK TECHNIQUESCISA / PUBLIC THREAT REPORTSINFOSEC CURRENT EVENTS
Pick a few and be able to explain them in DETAIL - <a href="https://attack.mitre.org/">MITRE ATT&CK</a>Develop Hunt Hypotheses with a minimum of 1 hour of content to discussDevelop hunt scenarios & understand the technical attack chain
<p></p> <p></p> <h3 align="left">πŸ”—<b>CH33R10'S THREAT HUNTING CYCLE</b></h3> <ol> <li><b>RESEARCH</b> - Hypothesis generation and understanding the technical details.</li> <li><b>ANALYSIS</b> - Collect the necessary data, create searches, run the searches, and analyze the results.</li> <li><b>CONCLUSIONS</b> - Findings, mitigations, documentation, lessons learned.</li> <li><b>DETECTIONS</b> - Automate the Hunts you can.</li> <li><b>RINSE & REPEAT</b></li> </ol> <p></p> <h3 align="left">πŸ—‘οΈ<b>CH33R10'S THREAT HUNTING TIPS</b></h3> <ol> <li><b>THREAT HUNT TYPE</b> <ul><li><b>STRUCTURED:</b> Known TTPs, IOCs, Artifacts</ul></li> <ul><li><b>UNSTRUCTURED:</b> Unknown</ul></li> <li><b>INTERNAL vs. EXTERNAL</b> <ul><li>Example: Cobalt Strike Beacon Hunting in Network vs. ITW (In the Wild)</ul></li> <p></p> <p><h1 align="center">πŸ“š<b>LEARNING RESOURCES</b></h1></p> <p>😎<b>CHEATSHEETS</b></p> <ul> <li>Malware Archaeology Cheatsheets - Windows - <a href="https://www.malwarearchaeology.com/cheat-sheets">Link 1</a>, <a href="https://static1.squarespace.com/static/552092d5e4b0661088167e5c/t/5d5588b51fd81f0001471db4/1565886646582/Windows+Sysmon+Logging+Cheat+Sheet_Aug_2019.pdf">Link 2</a>, Back up copy for Link 2 - <a href="https://github.com/ch33r10/BlueSpace2021/blob/main/rock/Windows%2BSysmon%2BLogging%2BCheat%2BSheet_Aug_2019.pdf">Link 3</a></li> <li>Olaf Hartong. Sysmon Cheatsheet - <a href="https://github.com/olafhartong/sysmon-cheatsheet/blob/master/Sysmon-Cheatsheet-dark.pdf">Link</a></li> <li>SANS Hunt Evil Poster - <a href="https://www.sans.org/posters/hunt-evil/">Link</a></li> <li>SANS Intrusion Discovery for Windows Cheatsheet - <a href="https://www.sans.org/posters/intrusion-discovery-cheat-sheet-for-windows/">Link</a></li> </ul> <p></p> <p>🌎<b>DETECTIONS/HUNTS</b></p> <ul> <li>BlueTeamLabs - Azure Sentinel Hunting Resource - <a href="https://github.com/BlueTeamLabs/sentinel-attack/tree/master/detections">Link</a></li> <li>David J. Bianco. Threat Hunting Project - Threat Hunts - <a href="https://github.com/ThreatHuntingProject/ThreatHunting/tree/master/hunts">Link</a></li> <li>Detection Ideas Repo by Vadim Khrykov @BlackMatter23 - <a href="https://github.com/vadim-hunter/Detection-Ideas-Rules/">Link</a></li> <li>Hurricane Labs - Threat Hunting with Splunk: Part 2, Process Creation Log Analysis - <a href="https://hurricanelabs.com/splunk-tutorials/threat-hunting-with-splunk-part-2-process-creation-log-analysis/">Link</a></li> <li>Roberto Rodriquez. ThreatHunter Playbook - <a href="https://github.com/OTRF/ThreatHunter-Playbook">Link</a></li> <li>Sigma Rules - <a href="https://github.com/SigmaHQ/sigma">Link</a></li> <li>Splunk - Advanced Threat Detection and Response - <a href="https://www.splunk.com/pdfs/technical-briefs/advanced-threat-detection-and-response-tech-brief.pdf">Link</a></li> <li>YARA Rules Resource - <a href="https://github.com/InQuest/awesome-yara">Link</a></li> </ul> <p></p> <p>🏹<b>GENERAL INFO</b></p> <ul> <li>BLOG: BC Security Offensive Security Tools - <a href="https://www.bc-security.org/post/category/offensive-security-tools/">Link</a></li> <li>BLOG: Red Canary - <a href="https://redcanary.com/blog/">Link</a></li> <li>BLOG: SCYTHE Threat Thursday - <a href="https://www.scythe.io/library/threat-thursday-evading-defenses-with-iso-files-like-nobelium">Link</a></li> <li>BLOG: SpecterOps - <a href="https://posts.specterops.io/">Link</a></li> <li>Ch33r10's PURPLE TEAM EXERCISE IDEA QUEUE W/ THREAT HUNTING SUGGESTIONS - <a href="https://docs.google.com/spreadsheets/d/1wHRrqwb1chTWP8kQqJjA2Chl7bUtCxRlobiyT3V2thE/edit?usp=sharing">Link</a></li> <li>Ch33r10's Twitter Threat Hunting List - <a href="https://twitter.com/i/lists/1445402146434867206">Link</a></li> <li>C2 Matrix by Jorge Orchilles, Bryson Bort & Adam Mashinchi - <a href="https://www.thec2matrix.com/">Link</a></li> <li>C2 Matrix Slingshot VM with C2s Pre-Installed + VECTR by SANS Institute - <a href="https://www.sans.org/tools/slingshot/">Link</a></li> <ul><li>DEMO: C2 Matrix VM Walkthru with Jorge Orchilles - <a href="https://howto.thec2matrix.com/slingshot-c2-matrix-edition">Link</a></ul></li> <li>David J. Bianco and Cat Self. SANS Threat Hunting & IR Europe Summit 2020 - <a href="https://youtu.be/HInxsRyYCK4">Link</a></li> <li>David J. Bianco. Sqrrl Archive - <a href="https://www.threathunting.net/sqrrl-archive">Link</a></li> <li>David J. Bianco. The Pyramid of Pain - <a href="http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html>Link</a></li> <li>David J. Bianco. The ThreatHunting Project - <a href="https://www.threathunting.net/">Link</a></li> <li>David J. Bianco. The Threat Hunt Project - Analysis Environment - <a href="https://hub.docker.com/r/threathuntproj/hunting/">Link</a></li> <li>David J. Bianco. The ThreatHunting Project - Recommended Reading List - <a href="https://www.threathunting.net/reading-list">Link</a></li> <li>Digit Oktavianto. Cyber Threat Hunting Workshop - <a href="https://www.itu.int/en/ITU-D/Cybersecurity/Documents/CyberDrill-2020/Cyber%20Threat%20Hunting%20Workshop%20-%20ITU%2019112020.pdf">Link</a></li> <li>iRed Team - <a href="https://www.ired.team/">Link</a></li> <li>Jason Wood. Becoming a Threat Hunter: This Is One Way - Texas Cyber Summit 2021 - <a href="https://youtu.be/na1PBrWvJjY">Link</a></li> <li>Jennifer Gruener. DIY Splunk - <a href="https://drive.google.com/file/d/1A41Jkydl1z2ydD6ApDjN-fMAYMMNHsHb/view">Link</a></li> <li>Joshua Stevens. Hunting for the Undefined Threat: Advanced Analytics & Visualization. RSA Conference 2015 - <a href="https://docs.huihoo.com/rsaconference/usa-2015/anf-w04-hunting-the-undefined-threat-advanced-analytics-visualization.pdf">Link</a></li> <li>Matt Bromiley. Thinking like a Hunter: Implementing a Threat Hunting Program. SANS Analyst Paper - <a href="https://www.sans.org/reading-room/whitepapers/analyst/thinking-hunter-implementing-threat-hunting-program-38923">Link</a></li> <li>MITRE ENGENUITY - ATT&CK Evaluations - <a href="https://attackevals.mitre-engenuity.org/">Link</a></li> <li>Robert M. Lee and David J. Bianco. Generating Hypotheses for Successful Threat Hunting. SANS Analyst White Paper - <a href="https://www.sans.org/reading-room/whitepapers/threats/generating-hypotheses-successful-threat-hunting-37172">Link</a></li> <li>Roberto Rodriguez. How Hot is your Hunt Team? - <a href="https://cyberwardog.blogspot.com/2017/07/how-hot-is-your-hunt-team.html">Link</a></li> <li>Splunk - Threat Hunting with Splunk: The Basics - <a href="https://www.splunk.com/en_us/blog/security/hunting-with-splunk-the-basics.html">Link</a></li> <li>Sqrrl. A Framework for Cyber Threat Hunting - <a href="https://www.threathunting.net/files/framework-for-threat-hunting-whitepaper.pdf">Link 1</a> & Backup copy for Link 1 <a href="https://github.com/ch33r10/BlueSpace2021/blob/main/rock/framework-for-threat-hunting-whitepaper.pdf">Link 2</a></li> <li>The DFIR Report - <a href="https://thedfirreport.com/">Link</a></li> <li>Valentina Costa-Gazcon. Practical Threat Intelligence and Data-Driven Threat Hunting - <a href="https://www.amazon.com/Practical-Threat-Hunting/dp/1838556370">Link</a></li> </ul> <p></p> <p>πŸ€“<b>INTERVIEW RESOURCES</p></b> <ul> <li>Questions for Infosec Job Twitter Thread - <a href="https://twitter.com/Ch33r10/status/947868048676945922?s=20">Link</a></li> <li>Questions to Find RED FLAGS at a Company Twitter Thread - <a href="https://twitter.com/ccieby30/status/1316040342454534144?s=20">Link</a></li> <li>Questions to Prepare for Trait-based Interview Questions Twitter Thread - <a href="https://twitter.com/jhencinski/status/1450252053188599814?s=20">Link</a></li> </ul> <p></p> <p">🎺<b>SANS THREAT HUNTING</b></p> <ul> <li>SANS THREAT HUNTING PLAYLIST🎬 - <a href="https://youtube.com/playlist?list=PLfouvuAjspTpDHZ4gudmK55ZGDS_NmiDl">Link</a></li> <li>SANS THREAT HUNTING SUMMIT 2021 Links from the chats collected by Cassie @DFIRDetective - <a href="https://start.me/p/DP6oRw/sans-threat-hunting-2021">Link</a></li> <li>SANS THREAT HUNTING SUMMIT 2020🍿 - <a href="https://youtube.com/playlist?list=PLfouvuAjspTpESwgitHe8roa7XBOnemFa">Link</a></li> <li>SANS THREAT HUNTING & INCIDENT RESPONSE SUMMIT 2019πŸ“½οΈ - <a href="https://youtube.com/playlist?list=PLfouvuAjspToqZfYaOuWlnHCZUcBTRjzq">Link</a></li> <li>SANS THREAT HUNTING & INCIDENT RESPONSE SUMMIT 2018🍫 - <a href="https://youtube.com/playlist?list=PLfouvuAjspTrUOTh_FTljg3qAXHPtOrIx">Link</a></li> <li>SANS THREAT HUNTING & INCIDENT RESPONSE SUMMIT 2017🍬 - <a href="https://youtube.com/playlist?list=PLfouvuAjspTr95R60Kt7ZcoerR6tYoCLA">Link</a></li> </ul> <p></p> <b></b> <p><h1 align="center">πŸ‹οΈ<b>TRAINING</b></h1></p> <ul> <li>Active Countermeasures - Cyber Threat Hunting Training - Cost: FREE - <a href="https://www.activecountermeasures.com/cyber-threat-hunting-training-course/">Link</a></li> <li>Applied Network Defense - Practical Threat Hunting - Cost: πŸ’² - <a href="https://www.networkdefense.co/courses/hunting/">Link</a></li> <li>BlueTeamLabsOnline - Cost: πŸ’² - <a href="https://blueteamlabs.online/">Link</a></li> <li>CyberDefenders - Windows Threat Hunting and others - Cost: FREE & πŸ’² - <a href="https://cyberdefenders.org/">Link</a></li> <li>Detection Lab by Chris Long - Cost: FREE - <a href="https://github.com/clong/DetectionLab">Link</a></li> <li>INE elearnsecurity - Threat Hunting - Cost: πŸ’² - <a href="https://ine.com">Link</a></li> <li>Mosse Institute - Certified Threat Hunter - Cost: πŸ’² - <a href="https://www.mosse-institute.com/certifications/mth-certified-threat-hunter.html">Link</a></li> <li>SANS FOR508 Advanced Incident Response, Threat Hunting, and Digital Forensics - Cost: πŸ’² - <a href="https://www.sans.org/cyber-security-courses/advanced-incident-response-threat-hunting-training/">Link</a></li> <li>Splunk Attack Range - Cost: FREE - <a href="https://github.com/splunk/attack_range">Link</a></li> <li>Splunk's Boss of the SOC (BOTS) - Cost: FREE - <a href="https://live.splunk.com/splunk-security-dataset-project">BOTS v1</a>, <a href="https://events.splunk.com/BOTS_2_0_datasets">BOTS v2</a>, <a href="https://www.splunk.com/en_us/blog/security/botsv3-dataset-released.html">BOTS v3</a></li> <li>Splunk Workshops - Cost: FREE - <a href="https://www.splunk.com/en_us/about-us/events.html">Link</a></li> <b></b> <p><h1 align="center">πŸ’Ž<b>THANK YOU</b></h1></p> <ul> <p>Thank you to BlueSpace and Ekoparty! <3</p> <p>Shoutout to @plugxor Muchas Gracias!</p> </ul> <b></b> <hr></hr> <h6 align="center"><small>FOR THE LAWYERS</small></h6> <h6 align="center"><sub>"The opinions expressed in this Github repo are those of the individual account, in their individual capacity, and not necessarily those of the employers. Mention of any vendors, services, products, or otherwise does not endorse them as a vendor. This content and any related discussions are solely the views, opinions, and experiences of the participants and should not be presumed to reflect the opinion or the official position of any employers of the participants. Examples and views provided herein, including strategies, goals, targets, and indicators are for illustrative purposes only and should not be regarded as representative of the participants' employers or respective portfolios. To the extent that this participation, discussion, and interview outlines a general technology direction, the participants' employers have no obligation to pursue any such approach or to develop or use any functionality mentioned herein. Any suggested technology strategy or possible future developments are subject to change at the employers' sole discretion without notice. Content in this presentation is the intellectual property of the applicable creators and may be protected under the copyright laws of the United States and/or other countries. All trademarks are the property of their respective owners and are used for informational purposes only."</sub></h6>