Threat Hunting Tutorial- Day 11, Hunting Process Creation with Splunk

preview_player
Показать описание
Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.

In the ransomware hunt series, I introduced you to process creation log sources in Windows, relevant data fields for analysis, and instructions on how to import this data into Splunk. Here I am going to focus on some basic queries you can use to interrogate those logs and how to filter benign results. There will also be a small section on hypothesis and questions you can ask of this data to help discover anomalous activity.

So in today's episode we will focus on very basic level of data analysis of doing baselining with Process Creation events and how to efficiently use Splunk queries to understand what is normal and what is not. In coming up episodes, we will focus on live demo using these same methods and will explore how can we identify anomalous behavior in a set of data.

WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!!
-------------------------------------------------------------------------------------------------------------------------

📞📲
FOLLOW ME EVERYWHERE-
-------------------------------------------------------------------------------------------------------------------------
✔ Twitter: @blackperl_dfir
Рекомендации по теме
Комментарии
Автор


Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.

In the ransomware hunt series, I introduced you to process creation log sources in Windows, relevant data fields for analysis, and instructions on how to import this data into Splunk. Here I am going to focus on some basic queries you can use to interrogate those logs and how to filter benign results. There will also be a small section on hypothesis and questions you can ask of this data to help discover anomalous activity.

So in today's episode we will focus on very basic level of data analysis of doing baselining with Process Creation events and how to efficiently use Splunk queries to understand what is normal and what is not. In coming up episodes, we will focus on live demo using these same methods and will explore how can we identify anomalous behavior in a set of data.


WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!!


📞📲
FOLLOW ME EVERYWHERE-

✔ Twitter: @blackperl_dfir

BlackPerl
Автор

Hey Man, First of all I would like to thank you so much for uploading such videos. Your videos are always informative for people who are new to threat hunting or IR or forensics. I have a request, can you please make a video on hypothesis based hunting where you take any 1 or 2 Tactics or Techniques from MITRE and start hunting in an environment. Please show us how it is done in real world and how will you make use of EDR tool and Splunk queries in such case. Please make a lengthy video. I will be grateful to you. Again, I would like to say that you are doing God's work.

puneetkhandelwal
Автор

Hi, thanks for your content.
It's really help us.
I have two requests,
1). can you please make a video on SOC admin job role in a practical way.

2) As your are working as Security Engineer, how a IT Engineer can switch to Cybersecurity Engineer.

WaseemAkram-wrfq
Автор

Thank you so much your video's and they are helping in learning threat hunting and please keep up this good work. Waiting for your next topic of this video

napster