🏹

Threat Hunting & Detection techniques

Threat Hunting general techniques

Hunting based on logs

Enabling your Windows logs

Useful Windows Event Logs during an investigation

Configuring AWS logs

How to respond in AWS?
How to respond in AWS?

Detection based on Windows artefacts and tools used by the attacker

Advanced Incident Detection and Threat Hunting using Sysmon (and Splunk) Tom Ueltschi, Swiss Post CERT.

Hunting on Azure

Enhancing your detection capabilities

🛠️
DFIR Tooling

🗃️
AppCompatProcessor
logparsingosxlinux
🦹🏼
Attack Data by Splunk
adversary emulationsplunk
🔍
Autopsy
all-in-oneforensicsanalyticsartifact collectionartifact analysis
🦠
Crits
cyber threat intelligenceanalytics
DetectionLab
detection toolsandboxwindowsactive directory
🗃️
DFIR-O365RC
artifact collectionlogo365
📑
Fenrir
ioc scannerlinuxosx
🦌
HELK
analytics
📑
Logdissect
logparsing
LOKI
yaraioc scanner
📑
LORG
logartifact analysishttpd
📑
MEEKRAT
windowsartifact collectionioc scanner
⚙️
MSTIC Jupyter and Python Security Tools
acquisitionartifact collectionanalyticsartifact analysisazure sentinel
🔍
osquery
analyticssystem monitoringosxlinuxwindowsfreebsd
📄
OSSEM
logstandardizationdocumentation
📑
PyaraScanner
yaraioc scanner
📑
rastrea2r
yaraartifact analysiswindowslinuxosx
🔍
Redline (FireEye)
forensicsanalyticswindowslinuxosxartifact collection
Security Onion
all-in-oneanalyticslinux distribution
📑
Sigma
logyararulesetsiemalerting
🦌
SOF ELK
analytics
StreamAlert
analyticsserverlessalertinglogawslambda
🌟
Sysmon DFIR
windowsartifact collectiondetection toolrulesetsystem monitoringsysmon
🦠
ThreatFox
saascyber threat intelligenceartifact analysismalware analysisioc scanner
Yara
cyber threat intelligenceyara
Yara-Rules
cyber threat intelligenceyararuleset