Logs & You: Explaining Threat Hunting to Non-Threat Hunters

BEFORE ME, THERE IS YOU (AND YOUR LOGS)

WHAT ARE YOU DOING TO HELP

HOW DO WE LOOK AT EVENT LOGS

PARENT-CHILD PROCESS RELATIONSHIP IN THE LOGS

NORMAL VS ABNORMAL EVENT LOGS

THE HUNT! (THE FUN PART)

CONCLUSION

--

--

--

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

MiBASE Protocol — Presale

EG-CTF — Data Leakage Challenge Writeup

Cryptography for Noobs

The Security, Functionality, and Usability Triangle

A Defender’s Perspective of Sitecore XP Deserialization RCE (CVE-2021–42237)

HackTheBox-Search

{UPDATE} 開心消糖果-2018單機愛消除遊戲 Hack Free Resources Generator

Apple updates iOS to fix crypto wallet security vulnerabilities

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Cyborg Security

Cyborg Security

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

More from Medium

Threat Hunt Deep Dives: Get to Know Your Log — Pt. 1

Vulnerabilities — Can you survive this data avalanche?

Source: CVEDETAILS.COM, December 29, 2021

Detection Design Patterns — Process Creation

Detecting Kerberos Relaying Attacks