TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Questions From a Beginner Threat Hunter

BHIS · 2025-01-30 · Read original ↗

ATT&CK techniques detected

5 predictions
T1071.004DNS
93%
"investigated further. if you plan to do your hunts on the endpoints, you need to have a strong knowledge of every operating system and the applications they are using. for example, powershell is a powerful scripting language built into the windows operating system. it is rare tha…"
T1095Non-Application Layer Protocol
89%
"passing between the internal network and the internet. this is usually accomplished by capturing traffic at the internal interface of the firewall. this may be done with a network tap or by leveraging a switch span port. once the data is collected, you need tools and processes to…"
T1040Network Sniffing
78%
"questions from a beginner threat hunter questions from a beginner threat hunter answered by chris brenton of active countermeasures | questions compiled from the infosec community by shelby perry this article was originally published in the threat hunting issue of our infosec zin…"
T1040Network Sniffing
60%
"increase in the number of dns queries. q : there are so many tools out there … how do i know which to use for what? a : try them out! see which works best in your environment and matches your workflow. also, don ’ t expect one tool to always be a perfect fit for every need. for e…"
T1572Protocol Tunneling
43%
"investigated further. if you plan to do your hunts on the endpoints, you need to have a strong knowledge of every operating system and the applications they are using. for example, powershell is a powerful scripting language built into the windows operating system. it is rare tha…"

Summary

Answered by Chris Brenton of Active Countermeasures | Questions compiled from the infosec community by Shelby Perry This article was originally published in the Threat Hunting issue of our infosec […]

The post Questions From a Beginner Threat Hunter appeared first on Black Hills Information Security, Inc..