TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Pentesting, Threat Hunting, and SOC: An Overview

BHIS · 2024-10-31 · Read original ↗

ATT&CK techniques detected

7 predictions
T1654Log Enumeration
92%
"that is used in a soc. this is a tool that collects and analyzes log events, and gives alerts on potential incidents. there are many different vendors for siem tools, such as splunk, microsoft, alienvault, and more. in addition, the soc might use an endpoint detection and respons…"
T1654Log Enumeration
48%
"it is a human - driven process that empowers organizations to stay one step ahead of cyber adversaries and improve their overall cybersecurity defenses. a threat hunter should have the mindset that a network is already compromised. threat hunters should also have an established b…"
T1059.004Unix Shell
45%
"are critical in this field. command - line interface knowledge understanding linux and windows commands will provide — - an interface for the vast majority of hacking and penetration testing tools { wget, curl, nikto, metasploit, sqlmap, etc. ). - ‘ screen ’ or ‘ tmux ’ allows yo…"
T1595Active Scanning
41%
"and threat intelligence to help create a threat hunting hypothesis. - don ’ t reinvent the wheel. leverage community resources and security vendor reports to help improve threat hunting. - if you ’ re moving too fast to keep notes, slow down. - be constantly looking for misconfig…"
T1592Gather Victim Host Information
32%
"and threat intelligence to help create a threat hunting hypothesis. - don ’ t reinvent the wheel. leverage community resources and security vendor reports to help improve threat hunting. - if you ’ re moving too fast to keep notes, slow down. - be constantly looking for misconfig…"
T1592Gather Victim Host Information
31%
"it is a human - driven process that empowers organizations to stay one step ahead of cyber adversaries and improve their overall cybersecurity defenses. a threat hunter should have the mindset that a network is already compromised. threat hunters should also have an established b…"
T1595Active Scanning
30%
"- db. com - rapid7 - db – rapid7. com / db / - nist – nvd. nist. gov / vuln / search using these skills, knowledge, and tools, a successful penetration tester will be able to discover vulnerabilities, create reports that help inform leadership of security weaknesses, and provide …"

Summary

By Ray Van Hoose, Wade Wells, and Edna Jonsson || Guest Authors This post is comprised of 3 articles that were originally published in the second edition of the InfoSec […]

The post Pentesting, Threat Hunting, and SOC: An Overview appeared first on Black Hills Information Security, Inc..