YF Consulting - Cyber Security

Threat Hunting & Incident Response

Shift from a reactive to a proactive defense posture. This module teaches you how to actively hunt for threats within your network, analyze indicators of compromise, and respond decisively to security incidents.

The Proactive Mindset

Traditional security is often reactive; it waits for an alarm to go off. Threat hunting is the proactive practice of searching through networks and datasets to detect and isolate advanced threats that evade existing security solutions. It operates under the assumption that your network is already compromised and that you must find the adversary before they achieve their objectives.

The Threat Hunting Loop

Effective threat hunting follows a structured, iterative process:

The Pyramid of Pain

The Pyramid of Pain is a concept that helps illustrate the effectiveness of different types of indicators. The goal of a threat hunter is to operate at the top of the pyramid. Denying an adversary their TTPs is far more effective and painful for them than simply blocking a hash value or IP address.

The Pyramid of Pain illustrates the difficulty for an attacker when defenders deny them different types of indicators.

Hunting for Living Off the Land (LOLBAS)

"Living Off the Land" is a technique where attackers use a system's own legitimate tools and processes to carry out their objectives. This makes them difficult to detect because they are not introducing new, obviously malicious files onto the system. Hunting for LOLBAS activity is a critical skill.

Example Hunt: Suspicious PowerShell Activity

Hypothesis: An attacker is using PowerShell to execute obfuscated or fileless malware.

What to look for:


# Example SIEM Query (Splunk style) to find encoded PowerShell commands
index=wineventlog EventCode=4688 New_Process_Name="powershell.exe" (Process_Command_Line="*-enc*" OR Process_Command_Line="*-encodedcommand*")

# This query searches Windows event logs for process creation events (4688)
# where powershell.exe is launched with an encoded command flag.
                

Introduction to Incident Response (IR)

When a hunt uncovers a real threat, the incident response process begins. The goal of IR is to contain the damage, eradicate the threat, and recover normal operations as quickly as possible.

The IR Lifecycle (NIST Framework)