Behavioral task
behavioral1
Sample
Introduction to Threat Hunting.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Introduction to Threat Hunting.pdf
Resource
win10v2004-20231222-en
General
-
Target
Introduction to Threat Hunting.pdf
-
Size
3.2MB
-
MD5
b9359cab24c1a909f617503c74e00a9a
-
SHA1
5189b537e71f701a9033abe352d61cf5cdfcc6ee
-
SHA256
612f65b084a3e340a70935f9726ed1d908ce5a1c214e7490a27e11149921f88d
-
SHA512
ff247a05d25e7f81b0f19037485adfaae00c10ac684b5360526de8d2712d32c75e3b0ffca3026948c12979c6e4f13d416be965cb14a1d61e8e9053cab83751b5
-
SSDEEP
98304:GjaYJFfffffffAILzLoAMZ5/rDH+VXfWu:bYJFfffffffXUTj/rDeV/
Malware Config
Signatures
Files
-
Introduction to Threat Hunting.pdf.pdf
-
https://apps.splunk.com/app/4617/
-
http://www.cnn.com/2014/04/04/tech/gaming-gadgets/5-year-old-xbox-hack/
-
http://arstechnica.com/security/2012/10/google-chrome-exploit-fetches-pinkie-pie-60000-hacking-prize/
-
http://www.zdnet.com/article/teenager-hacks-google-chrome-with-three-0day-vulnerabilities/
-
https://github.com/EC-DIGIT-CSIRC/openai-cti-summarizer
-
http://blog.sqrrl.com/the-cyber-hunting-maturity-model
-
https://www.rsaconference.com/writable/presentations/file_upload/anf-w04_hunting-the-undefined-threat-advanced-analytics-_-visualization.pdf
-
https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-soska.pdf
-
http://www.arguslab.org/documents/spsi_csirts_preprint.pdf
-
http://www.intel.com/Assets/en_US/PDF/whitepaper/wp_IT_Security_RiskAssessment.pdf
-
http://www.dtic.mil/get-tr-doc/pdf?AD=ADA586960
-
http://threatmodelingbook.com/
-
https://dfir-blog.com/2015/11/24/protecting-windows-networks-dealing-with-credential-theft/
-
https://isc.sans.edu/forums/diary/Detecting+Mimikatz+Use+On+Your+Network/19311/
-
https://adsecurity.org/?tag=yara
-
https://www.microsoft.com/security/sir/)
-
http://sei.cmu.edu
-
https://redsiege.com/tools-techniques/2020/10/detecting-kerberoasting/
-
https://adsecurity.org/?p=3513
-
https://www.cyborgsecurity.com/hunter-platform/building-an-effective-threat-hunting-report-template/
-
https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/Gaining_the_Advantage_Cyber_Kill_Chain.pdf
-
https://attack.mitre.org/tactics/TA0043/10
-
https://attack.mitre.org/tactics/TA0043/Each
-
https://www.signalblur.io/getting-started-with-mitres-att-ck-navigator
-
http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.htmlHow
-
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-320a
-
http://stixproject.github.io/about/
-
http://arstechnica.com/security/2012/10/google-chrome-exploit-fetches-pinkie-pie-60000-hacking-prize/and
-
http://distribution.chat
-
https://www.pcmag.com/news/wormgpt-is-a-chatgpt-alternative-with-no-ethical-boundaries-or-limitationsWormGPTproduced
-
https://learn.microsoft.com/en-us/power-platform/faqs-copilot-data-security-privacy
-
https://github.com/EC-DIGIT-CSIRC/openai-cti-summarizerby
-
http://Logs7.in
-
https://tools.netsa.cert.org/silk/referencedata.html
-
https://attack.mitre.org/index.php/Main_Page
-
http://threatmodelingbook.com
-
http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=296146
-
https://www.autoblog.com/2017/08/04/self-driving-car-sign-hack-stickers/
-
https://dfir-blog.com/2015/11/24/protecting-windows-networks-dealing-with-credential-theft/https://isc.sans.edu/forums/diary/Detecting+Mimikatz+Use+On+Your+Network/19311/https://adsecurity.org/?tag=yara
-
https://www.microsoft.com/security/sir/
-
https://www.manageengine.com/products/active-directory-audit/kb/windows-security-log-event-id-4769.htmlWindows
- Show all
-