Threat Hunting and IOC's

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
28 minutes
Difficulty
Intermediate
CEU/CPE
1
Video Transcription
00:00
Hello. My name is Dustin, and welcome to monitoring network traffic. So what is thrown out?
00:06
Threat Hunting is pro, actively searching for malware or an attacker that may be hiding in your network.
00:12
Having a SIM to centralize all of your logs makes it much easier to hunt for threats in your network.
00:19
There's been a big push and security to go from, ah, reactive approach or handling security events as they occur to more of a proactive approach.
00:29
And why is this? Once an attacker gets past your basic security tools and into the network,
00:36
they're there for an average of 191 days before they're even discovered.
00:42
Think about that damage that could be done if an attacker was in your network for 191 days. That's over half a year.
00:50
Active threat outing is working towards lowering that time
00:54
detecting Attackers as soon as they're in the most security experts tend to use the 80 20 rule to assess cyber threats. That means that 80% of cyber threats air pretty unsophisticated and could be easily mitigated with your basic security hygiene patching, keeping things up to date
01:11
normal and a virus stuff like that.
01:14
But that leaves 20% of tax that are usually more advanced attacks.
01:19
These require a bit more than the standard defense to detect and respond to
01:26
getting started in routing.
01:29
So how do we hunt for these Maur Sophisticated threats? Well, first, you need to make sure your organization is ready. Threat hunting can be very successful if it's implemented correctly, but it can crash and burn if it's not.
01:44
At the very least, you should have automated blocking and monitoring tools like firewalls, endpoint detection of management along with some type of anti virus.
01:55
You'll also mean something to capture packets across the network, and it really does help to have a SIM toe organizing Corley. All this data, although it's it's not 100% necessary, but it does help a lot.
02:08
You'll also need access to some sort of threat intelligence. Otherwise, you wouldn't know it to look for. It wouldn't make sense to go hunting without a target in mind. So you need that threat intelligence to give you exactly that, whether it's out and I'll see a indicator of compromise or in Iowa am on an indicator of attack
02:29
this will get you started.
02:30
Once you've got all of your tools in place, you're going to need an experienced team, really, That ideally, knows your organization very well. Threat hunting is extremely difficult if you don't know the environment that you're in, um,
02:45
in your enterprise, maybe it's normal for user's to use O. R admits to use like teen viewer.
02:52
But in most enterprises, that's that's kind of a no, no, no, you don't want to see that running across your network. So it's good to know the environment that you're going to be hunting in.
03:04
In the last line I mentioned IOC is in, I always, um, and if you're new to security, you might not be aware of these terms. So leg aside, IOC's are indicators of compromise. Our pieces of data the indicate potentially malicious activity. These can include things like caches of malware,
03:22
I P addresses of commanding control servers or malicious domains.
03:27
I aways are indicators of attack. They're very similar toe IOC's, but primarily focus on identifying attacker activity while the attack is actually in
03:38
process. So, like IOC, something's already happened within Iowa. You're trying to look for things that may currently be happening.
03:46
IOC's can answer the question. What happened? And I always can answer what is happening and why.
03:53
Crowdstrike actually has a really great blah going over the differences between IOC's and I always so. If you'd like to know Maura, I definitely check it out. Um, you can see it at www dot crowdstrike dot com slash log sash indicators. Dash attack, dash verse,
04:13
dash indicators. Dash compromise
04:15
That's a really good. And it'll go over all the differences between the IOC's and I always
04:24
so let's go hunting.
04:25
So how do we hunt for these more sophisticated threats? It's important to remember that there is no one size fits all plan when it comes to threat hunting, every organization and every hunt really is going to be different and that every organization's gonna have different risks that are involved with that
04:46
specific organisation. And I've mentioned that it's important to be very familiar with in your environment or work with someone that is, if you're not,
04:55
it's impossible to look for threats if you don't know what's normal and what's not normal in your environment.
05:01
Before starting to hunt, you need to set some pee ers or prioritized intelligence requirements, and these are the questions that will actually drive your hunt. So what are you looking for?
05:14
Are you looking for data exfiltration attempts, Maybe a specific malware that's going around targeting organizations like yours? Maybe it's phishing attempts. You need to focus your hunt in order to be successful. You can't just go out there and
05:30
not know what you're looking for, not be organized. It's just not gonna work.
05:34
So the next few sites we're going to go over the free *** application along with some useful queries, you may be able to use
05:45
the best way to get familiar with the Simmons to use one.
05:49
I definitely wouldn't recommend going out and purchasing. They get enterprise license just to learn in your house. But Splunk actually offers a free version that I would highly recommend installing and using at home. Even if you're not using it to actively modern, it's it's good to play with it and have that skill and knowledge.
06:08
So let's go ahead and walk you through downloading and installing it, and then we'll go over a quick overview of the product, including different ways to get data in searching and alerts along with them reporting and dashboards.
06:23
So before we get into that,
06:26
I do have it downloaded on my window. Seven. Virtual machine. So that's actually downloading and installing now. So will happen there in just a little bit. But let's go over some really common and useful commands that you should be aware of. The 1st 1 is stats.
06:42
This provides statistics, which can then be grouped by optional fields.
06:47
Chart. This returns all the results in a tabular chart format, which makes things a lot easier to visualize and just a bunch of data.
06:57
De doop is something I use a lot. It removes duplicated results, which is really helpful if you've got a lot of information.
07:05
Rename allows you to rename a field or fields. Sliney can pass them into further queries.
07:14
Top displays. The most common field values, while rare display is the least common field values in a specific field,
07:21
and Splunk does offer documentation of all this on their website, which I definitely recommend checking out. They've got a quick reference guide and then also, um, common commands, and that they talk about ah stat chart and time charge.
07:41
So after this, we're gonna go and get into our Splunk demo. Like I said, you can download and install the free version of *** or even a trial of some of their other versions from *** dot com.
07:51
Ah, you do need to create an account, and with the free version, you're actually limited to AH index of 500 megabytes per day.
Up Next
Monitoring Network Traffic with SIEM

Monitoring Network Traffic with SIEM provides an in-depth practical application of a Security Information and Event Management (SIEM) system to provide robust network defense/monitoring capabilities. The module further elaborates on how SIEMs work, their capabilities, and explores some of the most popular SIEM options currently used today.

Instructed By