I just listened to a webinar on threat hunting. It's a thing you can do. Anyways, at one point the presenter talked about how he really preferred to threat hunt by looking at network protocols for threat hunting, and he focused on beaconing and C2.
Every time someone says that, I flash back to this amazing post from BitDefender, which is about how Flame did C2 over USB. https://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/ On the other side of things, Turla's Sat-spoofing blind TCP hijacking C2 is...a work of art. There's no other way to say it. https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/ That's the top tier, in my book, of offensive teams making cool statements about how big their brains are by designing C2 protocols that got used in the wild. I like to think INNUENDO's "actually use Outlook-MAPI to exit corporate networks" is quite good as well, but I'm biased, of course. Alex Stamos's best talk goes into some of the issues about why detecting network C2 is hard, but I think "Protocols are increasingly complex, in the sense that the Delta of the Delta brings pain in a way nothing else can" sums it up nicely. (https://youtu.be/2OTRU--HtLM?t=1674 27 minutes in). That doesn't mean that it's not worth TRYING to do massive statistical analysis of your network data, but it may have diminishing returns (like a 401k!). -dave
_______________________________________________ Dailydave mailing list Dailydave@lists.immunityinc.com https://lists.immunityinc.com/mailman/listinfo/dailydave