Zeroska
  • 🐱Zeroska - The Bold
  • Computer/Cyber Security
    • ⭐Fresh off the boat - for new Blue Teamer/ SOC Analyst
    • 💀Necromancer (DFIR)
      • 🕵️DFIR and DFIR case
        • 🗃️Case Files
          • Misconfiguration 0x01
      • 📔My own DFIR notes
        • The Mark of The Web (MOTW)
        • LNK Shortcut
        • Prefetch, AmCache, ShimCache in Windows
        • Malicious Document (VBA, Office, PDF, ...)
        • SRUM (System Resource Usage Monitor)
        • Volatility notes
        • Understand Logon Session in Windows
        • "Very" Hidden sheets in Excel
        • Hidden Processes
      • 📔Notes
        • Useful Resources
        • Useful Resources DFIR
        • Saved Content (Backup for the OG content get deleted)
          • How to be best SOC analyst ever
    • 🧙‍♂️Defense Witchcraft
      • Data Analysis as a Defender
      • Active Directory
      • Windows Event Logs
        • Authentication (Windows Account Life Cycle Events)
      • MS Exchange
      • Windows
    • 💙My Current Blue Team Operation
      • VLAN Monitoring Template
      • Daily Monitoring Report
      • General Playbook
      • JupyterHub Configuration Guide
      • How to train your Blue Team
    • 🏭ICS/OT
      • Setup ICS/OT Simulation Learning Lab
      • Smart Grids
      • Learning Modbus TCP
      • Learning DNP3
      • Resources/Blogs/Links
    • 🥷Threat Intelligence
      • Small Cyber Threat Intelligence Program
      • Intelligence Analysis [VN]
      • OSINT Information Monitoring
        • Telegram Info-Stealer Monitoring
      • C2 Tracker
      • Fake Website Tracker
      • Dark Web Investigation Attempt
      • Threat Intelligence Quick Win
      • Resources/Blogs/Links
  • 😒Computer and Technology
    • My Home Lab Setup
    • 🐴ELK Stack
      • Useful Resources
      • ELK Stack - Container - Docker Compose - AWS ECS
      • ECS - Elastic Common Schema
      • Elasticsearch
      • Logstash
      • Troubleshooting and Problems
    • 🐧Linux
      • Setting up good SSH Authentication
      • Configure Auditd and how to leverage it
      • ELF Format
      • Useful Links
    • 📦Containers
      • Docker container logs is quite big
      • Worth Reading
    • 🪠Splunk Learning Experience
      • Splunk Test Lab
      • Data Collection Tier (How to get the data)
      • SC4S Custom Filter For Windows Event Log in Syslog Format (NXLog)
      • Useful Resources
  • Threat Hunting
    • Hunting for Implant
    • Using STRIDE and DREAD
    • 🐳Predators and Preys (Computing)
      • Tracks or Hunting Artifacts
    • 📦Network Packet Analysis
      • The Basic
      • Tshark | Zeek Copy & Paste
      • Network Analysis Resources
    • Grep | Powershell Search | Regex
    • Hunting Resources
  • 🎵In my remains
    • Choices
    • The Art of Facing Unknown Problems
    • Build the best DFIR team
    • Reverse Engineering - Đồ án hướng ngành A "Hụt" của tôi
Powered by GitBook
On this page
  • Introduction
  • IoC Sweeper or Scanner

Was this helpful?

  1. Computer/Cyber Security
  2. Threat Intelligence

Threat Intelligence Quick Win

PreviousDark Web Investigation AttemptNextResources/Blogs/Links

Last updated 1 year ago

Was this helpful?

Introduction

Threat intelligence is no simple as creating an ioc scanner and scanning the environment and then that's it you're done. It is not like that. For me, it is about adding context to the customer environment, context to alerts that analysis is triage

IoC Sweeper or Scanner

IoC is the threat actor footprint (you can read more about the pyramid of pain right here: ) and why hashes are quite useless ()

So what is an IoC Sweeper, If you read current research about threat intelligence you know one or two things about IoC - Indicator of Compromised. People start to research the threat and or get compromised then publish this type of indicator for you to check/search in your IT/OT environment to know whether you also have already compromised or not -> "Alright Cool! That sounds amazing, how can I start to create my own IoC Sweeper" Like most systems there always has input -> processing -> output (this is just a simple version so it is called quick win)

  • Input: IoC feeds, threat feeds (which have IoC included), Twitter accounts that publish IoC, and many more source

  • Processing: a SIEM or any platform can store network, and host artifacts that you can search against the IoC

  • Output: Ayy I got a hit (Oh no I got a hit)

There are some metrics that you need to watchout

🥷
http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
http://detect-respond.blogspot.com/2022/04/stop-using-hashes-for-detection-and.html
This is the IoC