4 Threat intelligence for threat hunting

 

This chapter covers

  • The threat hunter–threat analyst relationship
  • Collecting, processing, and distributing threat- intelligence information
  • Threat-hunting based on threat-intelligence information
  • Working with multiple data sources during a threat hunt
  • Documenting and sharing new tactics, techniques, and procedures
  • Working under pressure

In chapter 3, we conducted a threat-hunting expedition based on the red team’s findings. In this chapter, we have the opportunity to work with the threat-intelligence and vulnerability management teams.

We start the chapter with a scenario in which we receive a threat-intelligence report that triggers the threat-hunting process. We will review the structure and content of a threat-intelligence report and understand the expectations of the threat hunter.

Next, we research the environment to understand the hunting landscape. We work on two data sources: web server access logs and public cloud firewalls. We get the opportunity to understand the capabilities and limitations of these data sources and how they might affect our hunting expedition. During the threat expedition, we continuously communicate with other teams, especially system administration and the threat-intelligence team.

4.1 Preparing for the hunt: Hunting for web shells

4.1.1 Scenario

4.1.2 Threat intelligence report

4.1.3 Research work

4.2 The hunting expedition

4.2.1 Searching for malicious uploads

4.2.2 Digging more into the web requests

4.2.3 Tracking with firewall logs

4.2.4 Addressing consequences

4.3 The threat-hunting process

4.3.1 Preparation

4.3.2 Execution

4.3.3 Communication

4.4 Exercises

4.5 Answers to exercises

Summary