Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Hunting in the Dark - UNC Cybersecurity Symposi...

Hunting in the Dark - UNC Cybersecurity Symposium 2016

"Hunting" is a key phase of the incident response lifecycle that aims to identify, on a proactive basis, unknown threats lurking in an environment. In practice, many hunting teams focus on searching for public or purchased IOCs­ often representing intelligence that has already been burned. Hunting without specific leads is difficult, and every environment (and incident) has its own unique characteristics. This presentation will provide analytic techniques that can identify generic evidence of post­-compromise activity, with focus on the contemporary approaches that targeted attackers employ for credential harvesting, persistence, and lateral movement in Windows environments. It will illustrate sources of evidence that are ideal for large­-scale anomaly analysis, and provide examples of how to effectively collect data, reduce noise, and minimize dependencies on external threat feeds.

Ryan Kazanciyan

October 05, 2016
Tweet

More Decks by Ryan Kazanciyan

Other Decks in Technology

Transcript

  1. Examining an environment, on a proactive or reactive basis, for

    evidence of malicious activity – without specific investigative leads
  2. Goals and success criteria Copyright 2016 Tanium Inc. All rights

    reserved. 4 • Functional at enterprise-scale • Complementary to IOC & threat feed detection • Repeatable over time
  3. My focus for this presentation Copyright 2016 Tanium Inc. All

    rights reserved. 5 • Endpoint-centric • Widely-available data • Techniques, not specific tools
  4. Your applications are noisy Copyright 2016 Tanium Inc. All rights

    reserved. 9 • Different OS versions and add-ons • User-installed applications • Random / GUID file names & paths • Temporary artifacts of software installers • Updates & patches “How many unique PE files (EXEs, DLLs, drivers) have been loaded across all my systems?”
  5. Your users are noisy Copyright 2016 Tanium Inc. All rights

    reserved. 10 • Maintenance and administration scripts • Ad-hoc troubleshooting • Service and application accounts • Misunderstood native OS behavior “How often do my privileged accounts authenticate across the environment?
  6. You cannot capture everything, constantly Copyright 2016 Tanium Inc. All

    rights reserved. 12 • OS-level telemetry • Application-level telemetry • Data at-rest • Volatile memory
  7. Defender bias Copyright 2016 Tanium Inc. All rights reserved. 15

    “…what may be critical to you…may not be the ‘crown jewels’ from the perspective of the adversary...” “You'll find yourself hunkered down in your Maginot Line bunkers, awaiting that final assault, only to be mystified when it never seems to come.” – Harlan Carvey Source: http://windowsir.blogspot.com)
  8. Practical example: BloodHound Copyright 2016 Tanium Inc. All rights reserved.

    17 • Graph analysis of AD relationships • Identify pathways to privilege escalation https://github.com/adaptivethreat/BloodHound
  9. Structuring the process Copyright 2016 Tanium Inc. All rights reserved.

    19 External IOCs & reputation data Homegrown IOCs & ad- hoc searches Targeted hunting workflows Continuous & automated analysis