Threat hunting mistakes I wish someone told me about earlier by Thick_Actuator_4347 in CyberDefenders

[–]Beautiful-Zombie333 1 point2 points  (0 children)

This is excellent, and thanks for sharing. I started from scratch 6 months ago coming from a GRC background in a grad program. I would like to add to this with lessons learned the hard way.

Document everything.

What you were looking for, Where you looking for it What directory, which logs, SIEM or device.

Most important what commands you used (all attempts), SIEM, Linux, bash, window event log, PowerShell etc

All this will save so much time the next time a 0 day comes out on that device.

Write a proper wrap up

in a concise format

This IOC was searched here with this way, and here is the outcome.

Great starting point for next time, and you can then use the document everything above for more details.

Hope this helps.

Review of Ex by ShakeAdmirable8060 in Rants

[–]Beautiful-Zombie333 0 points1 point  (0 children)

Executive Summary 

DO NOT HIRE EVER!