401 Reading 33 - marsecguy/reading-notes-cyberops GitHub Wiki
Threat Hunting
-
How are Threat Hunting and Pentesting different?
- Pentesting is an approved, internal process of having authorized actors seek vulnerabilities to exploit and seeing if those attempts are detected.
- Threat hunting is looking for unauthorized exploits (internal or external) that have already eluded detection.
-
What is the primary objective of Threat Hunting?
- To bridge the gap between detection and response and take a proactive approach to searching for and eliminating threats that may have already escaped detection.
-
Your organization has a fully functioning SOC but not active Threat Hunting. How would you advocate for your security organization to start Threat Hunting activities?
- I would point out that many previous data breaches have happened despite SOC controls and often continued to exploit the targets for long periods of time before being detected. I would also show that most of the times these events have been detected, it has been through outside intervention, such as law enforcement notification or external audits.
Source: Active Countermeasures