Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Threat Hunting – Esecuzione

Alias: PowerHunt

Sulla base della telemetria degli Endpoint viene eseguito un controllo sugli script Powershell eseguiti che contengono comandi associati ad attività sospette. 

Fonti:

ESEMPI

powershell.exe –ep Bypass “& {Get-Content . malware.ps2 | iex}

ESEMPI

net user username password domain

Get-WmiObject -Namespace rootsecuritycenter2 -Class antivirusproduct

Threat Hunting – Discovery

Alias: D-Hunter

Vengono eseguiti controlli sui comandi che permettono l’enumerazione di utenti, di processi, dei privilegi e la creazione di account. Vengono applicate le stesse logiche per il monitoraggio di ambienti AD e Azure AD.

Fonti:

Threat Hunting – Comando & Controllo

Alias: C2Hunt

Viene effettuato un controllo sul traffico dns delle applicazioni che comunicano con domini noti utilizzati per attività offensive come i servizi API di Github.

Fonti:

ESEMPI

Malleable C2

ESEMPI

New-ScheduledTaskAction -Execute ‘pwsh.exe’ -Argument ‘-NonInteractive -NoLogo -NoProfile -File “C:MyScript.ps1″‘

sc.exe \myserver create NewService binpath= c:windowsPayload.exe

Threat Hunting – Persistence

Alias: D-Hunter

Viene eseguito il monitoraggio costante di creazione di metodi di persistenza sul sistema, tecnica che permette di avere accesso all’endpoint compromesso dopo riavvio/chiusura processo.

Fonti: