1/1/2024 marks the start of the #DailyThreatHunt challenge! I challenge everyone to post their unique #threathunt ideas to the world. Help the #blueteam fight the good fight by helping those orgs that don't know where to start. Make threat hunting the new norm.
-------------
1/1/2024 Idea:🧐EDR cloud logins.
Hunt:
Find your EDR/XDR cloud console auth logs (S1, Crowdstrike, etc.). Who's logging in & from where? Are they expected? Record what you find. After a period of time, do the hunt again. Did anything change?
-------------
1/1/2024
0str1chS3c
@ostrich_sec
Replying to
@neonprimetime
Baseline network traffic via firewall logs or some type of IDS/IPS source. Gain an understanding of what is going in and out of the network. Great way to find evil, as malware has to beacon somehow.
-------------
1/2/2024 Idea:🧐Termination process
Hunt:
Pick a week of old terminations in ticketing system from perhaps last month. Focus on non-standard accounts like admin accounts (e.g. JDoeAdmin), non-AD linked accounts, cloud accounts, etc. Look in your SIEM & the source systems to see if any of those accounts are still enabled or have been used recently. Is your termination process even working?
-------------
1/3/2024 Idea:🧐 Internet Facing Systems
Hunt:
Inventory your internet facing websites. Using a web browser, connect to each from off-network (record what your IP address is) and attempt a login (even if you don't have access to any of them). Use a unique username that nobody else will try so it's easy to search. Then open up your SIEM, search for each of those login failures, and validate if you're actually even getting logs from those internet facing websites. You should have firewall logs, web access logs, and authentication logs at a minimum for each.
-------------
1/4/2024 Idea:🧐 Website Crawl
Hunt:
Pick site, list pages in logs recently viewed (200 success). Visit pages in browser. Any files in odd folder? webshell? unpatched plugin? data leak? access control issue? Run on another day, did new pages appear?
-------------
1/5/2024 Idea:🧐 Local Account Enumeration
Hunt:
Most authenticated vulnerability scanners can enumerate local accounts or admin. Export the results for your org. Ensure they're expected. Save results, re-run in future, diff & see what's new.
-------------
1/6/2024 :🧐
Software Supply Chain Compromise
Hunt:
Pick a critical application. Find all executables associated. Find all Network connections or DNS requests those executables made. Validate each EXE, DNS, and IP address is legitimate. Hunt the same thing again in future, looking for any new executables, IPs, or DNS requests that weren't there before. Think Solarwinds & CCleaner compromises. You're looking for a C2 connection or a new payload delivered from within a legitimate app
-------------
1/7/2024 #DailyThreatHunt #threathunt #blueteam
Idea:🧐
Subnet inventory
Hunt:
Pick a subnet such as a /24. IoT/OT are always fun. Validate and document each device using access control logs, firewall traffic, dns lookups, & ticketing system. Use a web browser or ssh client for example if you are able to connect to these devices as well to see consoles and banners. Looking for rogue devices or odd traffic.
—————-
1/8/2024 #DailyThreatHunt #threathunt #blueteam
Idea:🧐
Process Baseline
Hunt:
Pick a newly built pc. Use 4688 events or sysmon process create, list all EXE file names run in logs. Validate their legitimacy. Now run against some older pcs looking for any EXE on old but not on new pc.
-----------------
1/9/2024 Idea:🧐
Large Outbound
Hunt:
Use netflows or proxy logs to group outbound traffic by source, find top 10 endpoints sending traffic out in bytes. Validate the destinations. Use endpoint logs to figure out what app is uploading this data.
-----------
1/10/2024 Idea:🧐 Hardware Vendor Inventory
Hunt:
Select all MAC OUIs from your NAC logs. Group by # of devices for each OUI, focus on the rare ones that only show up once or twice. Validate those devices using your ticketing system, dns and firewall logs leaving that system, etc. You might find a rogue device, personal device, or other device that shouldn't really be there on your network. Save this list so you can check it again and see what new systems appear next week.
———-
1/11/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐 Default Password
Hunt:
Use vulnerability scanner OS fingerprint results to find non-standard systems like printers, cameras, etc. Navigate to them in web browser. Google default passwords and try them. Is your IT staff hardening?
---------------
1/12/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐 Unique User Agents
Hunt:
Group proxy logs by User Agent, count source systems using them, look for User Agents being used by only 1 host. Use endpoint logs to figure out what process or app made that connection. Is it a C2?
———-
1/13/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐 Revoked Drivers
Hunt:
Review all Sysmon driver loaded events (ID 6) where SignatureStatus is Revoked. Any instances where a vendor’s signing cert was stolen and re-purposed for malware? At a minimum the driver should be upgraded.
——-
1/14/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐
SYSTEM Processes
Hunt:
Pick a newly built pc. Use 4688 events or sysmon process create, list all EXE files running as SYSTEM. Validate their legitimacy. Now run against older pcs looking for anomalous SYSTEM processes.
——
1/15/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐Cloud Storage Buckets
Hunt:
Search your proxy logs for common cloud domains (e.g. .s3.amazonaws.com , .blob.core.windows.net) or services like .sharepoint.com . Any exposed data? Shadow IT? Cloud tenants you weren't aware of?
——-
1/16/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐Missed AV hits
Hunt:
If you have antivirus deployed, do all alerts get to your SOC? Likely not. Find the ones that didn’t make it to the SOC queue, figure out what they were and where they came from. Did something get missed?
------
1/17/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐Web Proxy Blocks
Hunt:
Your web proxy blocks a lot of things, but your SOC likely doesn't review them all. Find interesting blocked categories like malware, c2, pup software, etc. Is any blocked traffic from malware on a pc?
----------
1/18/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐VPN Many Users 1 IP
Hunt:
Look at remote access VPN logins, group by source IP, any IPs have multiple users logged in? Document these remote work buildings, 3rd party buildings, etc. Anything unexpected? Baseline & re-run later.
———
1/19/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐3rd Party Compromise
Hunt:
Get a list of your org’s critical 3rd parties (suppliers, vendors, contractors, etc). Look them up on social media or google for ransomware or breach notifications. Was any of your org’s data involved?
———
1/20/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐Command Line Web Requests
Hunt:
Search command lines events (any OS, from SIEM, EDR, etc) for wget, curl, Invoke-WebRequest, iwr, Invoke-RestMethod, WebClient DownloadFile, etc and baseline the URLs. Re-run later to find new ones.
----------
1/21/24 #DailyThreatHunt #threathunt #blueteam
Idea:🧐Network Router Commands Hunt: Baseline syslog from network routers (Cisco, etc) for what commands are run the most. Follow up on a future hunt looking for uncommon commands rarely run.
Idea:🧐Batch Script Files Hunt: Use sysmon file create events to see what batch scripts are getting created regularly. Baseline, validate their legitimacy. Look for new ones in the future.
Idea:🧐BitsAdmin jobs Hunt: Use the BITS-Client operational logs in windows to review jobs running. What are they doing? Are they expected? Anything malicious ?
No comments:
Post a Comment