GithubHelp home page GithubHelp logo

shikari's People

Contributors

rhigham-scwx avatar

Stargazers

 avatar

Watchers

 avatar

shikari's Issues

Enumerate Remote Access Tools

Title: Hunt for xyz
Hypothesis: Brief description of the activity you feel you are not covered for. E.g. What you will hunt for?
Trigger: What triggered this hunt
Reference: link to TTP description

Acceptance Criteria
This issue can be closed when the abstract has been updated and the report has been written. If the hunt can not be completed, this issue should be marked as blocked. If the hunt is no longer needed, the issue should be labeled as such and then closed.

Tasks

  • Validate Security Gap Exists
  • Validate Data Visibility/Usability
  • Define/Refine Abstract
  • Gather and Analyze Data
  • Write Report
  • Share Findings
  • Update the Abstract
  • Create New Issue to Repeat the Hunt (if needed)
  • Close this Issue

Note:

  • Incidents should be escalated as they are found.
  • If an abstract does not exist that can be updated and reused, create a new abstract.
  • If you plan to test to make sure the security gap exists through adversary emulation, notify your manager and security operations.
  • If you find inappropriate content or other compliance issues, check with management to determine next steps.
  • If this hunt did not produce logic that can be used to address the known gap, open a new issue to repeat the hunt in the future.

Live off the Land Binaries

Title: Hunt for malicious users using LOLBins
Hypothesis: Threat Actors are using LOL Binaries to download malicious files.
Trigger: Red Team used certutil, wmic, mshta, and other tools to download malicious payload
Reference:

Acceptance Criteria
This issue can be closed when the abstract has been updated and the report has been written. If the hunt can not be completed, this issue should be marked as blocked. If the hunt is no longer needed, the issue should be labeled as such and then closed.

Tasks

  • Validate Security Gap Exists
  • Validate Data Visibility/Usability
  • Define/Refine Abstract
  • Gather and Analyze Data
  • Write Report
  • Share Findings
  • Update the Abstract
  • Create New Issue to Repeat the Hunt (if needed)
  • Close this Issue

Note:

  • Incidents should be escalated as they are found.
  • If an abstract does not exist that can be updated and reused, create a new abstract.
  • If you plan to test to make sure the security gap exists through adversary emulation, notify your manager and security operations.
  • If you find inappropriate content or other compliance issues, check with management to determine next steps.
  • If this hunt did not produce logic that can be used to address the known gap, open a new issue to repeat the hunt in the future.

Malicious PowerShell

Title: Hunt for Malicious PowerShell
Hypothesis: Adversaries may abuse PowerShell commands and scripts for execution.
Trigger: Crown Jewels Analysis
Reference:

Acceptance Criteria
This issue can be closed when the abstract has been updated and the report has been written. If the hunt can not be completed, this issue should be marked as blocked. If the hunt is no longer needed, the issue should be labeled as such and then closed.

Tasks

  • Validate Security Gap Exists
  • Validate Data Visibility/Usability
  • Define/Refine Abstract
  • Gather and Analyze Data
  • Write Report
  • Share Findings
  • Update the Abstract
  • Create New Issue to Repeat the Hunt (if needed)
  • Close this Issue

Note:

  • Incidents should be escalated as they are found.
  • If an abstract does not exist that can be updated and reused, create a new abstract.
  • If you plan to test to make sure the security gap exists through adversary emulation, notify your manager and security operations.
  • If you find inappropriate content or other compliance issues, check with management to determine next steps.
  • If this hunt did not produce logic that can be used to address the known gap, open a new issue to repeat the hunt in the future.

Compromised Email Accounts

Title: Hunt for Compromised Email Accounts
Hypothesis: Business email compromise has become a very common method of attack.
Trigger: Threat Actor Intel
Reference:

Acceptance Criteria
This issue can be closed when the abstract has been updated and the report has been written. If the hunt can not be completed, this issue should be marked as blocked. If the hunt is no longer needed, the issue should be labeled as such and then closed.

Tasks

  • Validate Security Gap Exists
  • Validate Data Visibility/Usability
  • Define/Refine Abstract
  • Gather and Analyze Data
  • Write Report
  • Share Findings
  • Update the Abstract
  • Create New Issue to Repeat the Hunt (if needed)
  • Close this Issue

Note:

  • Incidents should be escalated as they are found.
  • If an abstract does not exist that can be updated and reused, create a new abstract.
  • If you plan to test to make sure the security gap exists through adversary emulation, notify your manager and security operations.
  • If you find inappropriate content or other compliance issues, check with management to determine next steps.
  • If this hunt did not produce logic that can be used to address the known gap, open a new issue to repeat the hunt in the future.

Detect ADFS Misuse

Title: Detect ADFS Misuse
Hypothesis: Threat actors are exploiting adfs
Trigger: Threat Intel surrounding the SolarWinds breach
Reference:

Acceptance Criteria
This issue can be closed when the abstract has been updated and the report has been written. If the hunt can not be completed, this issue should be marked as blocked. If the hunt is no longer needed, the issue should be labeled as such and then closed.

Tasks

  • Validate Security Gap Exists
  • Validate Data Visibility/Usability
  • Define/Refine Abstract
  • Gather and Analyze Data
  • Write Report
  • Share Findings
  • Update the Abstract
  • Create New Issue to Repeat the Hunt (if needed)
  • Close this Issue

Note:

  • Incidents should be escalated as they are found.
  • If an abstract does not exist that can be updated and reused, create a new abstract.
  • If you plan to test to make sure the security gap exists through adversary emulation, notify your manager and security operations.
  • If you find inappropriate content or other compliance issues, check with management to determine next steps.
  • If this hunt did not produce logic that can be used to address the known gap, open a new issue to repeat the hunt in the future.

Compromised Web Servers and Web Shells

Title: Hunt for compromised web servers and web shells
Hypothesis: Threat Actors have gained access to one or more of our externally facing web servers.
Trigger: Common method of attack. We evaluated our coverage and feel this is a gap.
Reference:

Acceptance Criteria
This issue can be closed when the abstract has been updated and the report has been written. If the hunt can not be completed, this issue should be marked as blocked. If the hunt is no longer needed, the issue should be labeled as such and then closed.

Tasks

  • Check for existing abstract
  • Validate Security Gap Exists
  • Validate Data Visibility/Usability
  • Define/Refine Abstract
  • Gather and Analyze Data
  • Write Report
  • Share Findings
  • Update the Abstract
  • Create New Issue to Repeat the Hunt (if needed)
  • Close this Issue

Note:

  • Incidents should be escalated as they are found.
  • If an abstract does not exist that can be updated and reused, create a new abstract.
  • If you plan to test to make sure the security gap exists through adversary emulation, notify your manager and security operations.
  • If you find inappropriate content or other compliance issues, check with management to determine next steps.
  • If this hunt did not produce logic that can be used to address the known gap, open a new issue to repeat the hunt in the future.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.