Threat Hunting
What is threat hunting?
When we examine this term we can see that it is hunting to uncover the threats in the information system. But we need to add something to describe it properly. We can describe it as we hunt for threats by imagining a hypothesis that there is a threat to our information system and based on that we conduct the hunting by using numerous techniques and tools.
Figure 1 - threat hunting illustration
Why threat hunting?
We need to conduct these threat hunting activities regularly to uncover the possible security threats to our information system. Because there can be zero-day vulnerabilities also. After we have discovered any kind of threat, we need to inform them to the liable authorities who can take action and mitigate them. By following this procedure we can secure our information system and it is an important step for information security.
What is the threat hunting cycle?
This threat hunting is never ended and we need to conduct it regularly as this is a cyclic process. It begins with the hypothesis which describes there is a possible threat in our information system which we need to uncover. So, creating a hypothesis is the first step.
After having a hypothesis we need to discover and uncover what are these possible threats using different tools and techniques. We need to search for these threats by taking time and we have to continue until we get any clue about a threat. sometimes it can take more than one month to uncover a threat.
As a third step, we need to uncover new patterns and TTPs. It means we need to uncover new possible threats to our systems. Here we should be able to uncover the new threats as day by day they and their patterns will change. Here the TTP term describes as Terrorist, Tactics, Techniques, and procedures. The terrorists are the attackers or the person who can carry out the threats to our system. Tactics mean the behavior mechanisms the people use to carry out the threats to our information systems. Techniques and procedures can describe as the tools, procedures, and mechanisms use to make a possible threat to our information system.
After those previous phases, we need to create proper analytics and reports and analyze what are the weaknesses in our systems and what are the possible threats and what are patterns attacker use to carryout these threats.
π₯°π₯°π₯°❤️π€
ReplyDeleteReally Interesting wasu ♥️
ReplyDelete❤️
ReplyDeleteGood one
ReplyDeleteπ❤
ReplyDeleteππ
ReplyDeleteGood π♥️
ReplyDelete❤️ππ»
ReplyDeleteπ₯
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteAmazing work ayyaπ
ReplyDeleteπ€©π€©π€©π€©very informative
ReplyDeleteGood job
ReplyDeleteVery important son π
ReplyDeleteGood job π€©
ReplyDeleteNiceπ₯
ReplyDeleteGreat π
ReplyDeleteWell Doneπ₯ππ»
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteGreatπ
DeleteGood job π
ReplyDeleteAmazing work
ReplyDeleteNice work ♥️ Very Informative
ReplyDeleteπ€
ReplyDeleteNice One
ReplyDelete♥️π€π»
ReplyDeleteNice work keep it up π₯❤️
ReplyDeletewell done.. Keep it up... ❤️❤️
ReplyDeleteSuperb brother π₯❤
ReplyDeleteGreat brother π
ReplyDeletenice work broππ»
ReplyDeleteGood job brother❤️π₯
ReplyDelete❤️π₯
ReplyDeleteGreat workπ₯³
ReplyDeleteπ
ReplyDeletewow ♥️
ReplyDeleteGood job πkeep it up
ReplyDeleteGood job...π
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteGreatπ
ReplyDeleteππ€❤
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteπͺ❤️π
ReplyDeleteBest article I've ever seen regarding threat hunting. Thank you very much for knowledge sharing❤
ReplyDeleteπ₯
ReplyDeleteGreat workπ keep it up
ReplyDelete❤❤❤
ReplyDeleteNice work with useful topic ❤
ReplyDelete✌️♥️
ReplyDelete