A DEATHCON Thrunting Workshop Overview Part 1: Helloooooooo thrunters. đ
A DEATHCON Thrunting Workshop Overview
đ This post was originally published on Mediumâcrossposting here for the THOR Collective crew. Enjoy!
Alright weâre going to try something newâŚa workshop delivered as blog posts. Intrigued? Stick around. If nothing else, youâll leave with some top-tier thrunting memes to share with your team.
Last November, Lauren Proehl and I, representing THOR Collective, had the privilege of presenting our Threat Hunting (or âthruntingâ as I like to call itâââcringe or not) workshop at the prestigious DEATHCON. And yes, weâre keeping the word âthruntingâ because itâs too good to give up. Major shoutout to Randy Pargman for helping make it such a memorable event!
What weâve got here is a series of blog posts breaking down the workshop, packed with plenty of insights and practical tips. These posts are your go-to resources for learning opportunities you can bring back to your organization, apply in real-world scenarios, and level up your thrunting game! đ
Whatâs on the menu? Weâre diving deep into the PEAK Threat Hunting Framework to make THRUNTing practical and actionable. PEAK is a vendor AND tool agnostic product you can use for structured threat hunting. đ¤, right? PEAK stands for âPrepare, Execute, and Act with Knowledge,â breaking the hunt into three core stages weâll explore in this series. And donât forget, knowledge is the key component, woven throughout all three stages of the hunt.
By the end, youâll be ready to apply hypothesis-driven, baseline (exploratory), and model-assisted hunting techniques, complete with Splunk examples to guide you. Letâs get started!
P.S. No Splunk? No problem! These techniques are adaptable to other tools, so you can work with the resources and data sources already at your fingertips.
Ready to embark on this thrunting journey? Letâs get after it! đŻ
Workshop Overview đľď¸ââď¸đ
In this series, weâll walk you through our Practical Threat Hunting with the PEAK Framework workshop, originally delivered at DEATHCON. Hereâs what you can expect:
Hypothesis-Driven Threat Hunting
Learn how to craft and test hypotheses to uncover potential threats in your environment. For example, starting with the idea of data exfiltration and searching for unusual outbound data traffic.Baseline (Exploratory) Threat Hunting
Establish what ânormalâ looks like in your data and find deviations that might indicate malicious activity. Think unusual login times or unexpected command-line executions.Model-Assisted Threat Hunting (M-ATH)
Harness the power of machine learning đŞ to analyze large datasets, find anomalies, and group similar events. Techniques like clustering and supervised learning make it possible to uncover patterns humans might miss.
Tools of the Trade đ ď¸
This workshop uses Splunk and a BOTS dataset, a treasure trove of simulated real-world attack data designed to mimic scenarios like ransomware attacks, insider threats, and more. While we wonât be providing the exact dataset for you to follow along, weâll guide you through the thought process and techniques so you can apply them to your own environments.
Stack Counting: Grouping events to identify unusual activity levels.
Outlier Detection: Finding anomalies by setting baselines.
Time Series Analysis: Spotting trends or irregularities over time.
Field Extraction and Search Filtering: Narrowing down large datasets to focus on what matters.
đ¨ Important Note đ¨ : The exact dataset weâre using isnât publicly available. However, you can explore and hunt through previous BOTS datasets, like BOTSv3, which offer a wealth of real-world-like data for honing your skills.
Why Read This Series? đĄ
Threat hunting isnât a one-size-fits-all practiceâââitâs a mindset. This series will give you actionable strategies, practical examples, and new ideas to enrich your security operations. Whether youâre a seasoned hunter or just getting started, thereâs something here for everyone.
Whatâs Next? đŽ
Before diving deeper into advanced scenarios, itâs essential to build a strong foundation. In the next blog post, weâll guide you through exploring your data sources, focusing on data sourcetypes and fields to understand the structure of your dataset. This step will help you get an idea of what ânormalâ looks like in your environment, setting the stage for effective searches and analyses. With these fundamentals in place, youâll be ready to uncover anomalies and apply the concepts learned in more complex hunts.
Ready to take the next step? Stay tuned for Part 2: Exploring Data Sourcesâ coming soon!
Hidden Gems đ
For those who made it this for đ, hereâs a little something extra:
đľď¸ââď¸ Challenge
Somewhere in this post lies a Base64-encoded secret. Can you find it and decode it? Only the most observant thrunters will uncover its meaning!
(Hint: Itâs tucked away where only a true hunter would lookâŚ)
And as always, happy thrunting!