Tag: Log Sources for Threat Hunting
Cyber Threat Hunt Cycle
Project Name: Cyber Threat Hunt cycle Description: – Whenever adversary is changing the routine procedure and evade defenses of enterprises Cyber… read out Cyber Threat Hunt Cycle
Project Name: Cyber Threat Hunt cycle Description: – Whenever adversary is changing the routine procedure and evade defenses of enterprises Cyber… read out Cyber Threat Hunt Cycle
HACKFORALB successfully completed threat hunting for following attack…
DNS Reconnaissance, Domain Generation Algorithm (DGA), Robotic Pattern Detection, DNS Shadowing , Fast Flux DNS , Beaconing , Phishing , APT , Lateral Movement , Browser Compromised , DNS Amplification , DNS Tunneling , Skeleton key Malware , Advance Persistent Threats, Low and Slow attacks , DoS, Watering Hole Attack Detection, Weh Shell , DNS Water Torch Attack , Intrusion Detection, Cookie visibility and theft, User login Session hijacking, Broken Trust, Pass the Hash, Session fixation, Honey Token account suspicious activities, Data Snooping / Data aggregation, Cross Channel Data Egress, Banking fraud detection, Chopper Web shell
Copyright © 2024 Detect Diagnose Defeat Cyber Threat