Join Ads Marketplace to earn through podcast sponsorships.
Manage your ads with dynamic ad insertion capability.
Monetize with Apple Podcasts Subscriptions via Podbean.
Earn rewards and recurring income from Fan Club membership.
Get the answers and support you need.
Resources and guides to launch, grow, and monetize podcast.
Stay updated with the latest podcasting tips and trends.
Check out our newest and recently released features!
Podcast interviews, best practices, and helpful tips.
The step-by-step guide to start your own podcast.
Create the best live podcast and engage your audience.
Tips on making the decision to monetize your podcast.
The best ways to get more eyes and ears on your podcast.
Everything you need to know about podcast advertising.
The ultimate guide to recording a podcast on your phone.
Steps to set up and use group recording in the Podbean app.
Join Ads Marketplace to earn through podcast sponsorships.
Manage your ads with dynamic ad insertion capability.
Monetize with Apple Podcasts Subscriptions via Podbean.
Earn rewards and recurring income from Fan Club membership.
Get the answers and support you need.
Resources and guides to launch, grow, and monetize podcast.
Stay updated with the latest podcasting tips and trends.
Check out our newest and recently released features!
Podcast interviews, best practices, and helpful tips.
The step-by-step guide to start your own podcast.
Create the best live podcast and engage your audience.
Tips on making the decision to monetize your podcast.
The best ways to get more eyes and ears on your podcast.
Everything you need to know about podcast advertising.
The ultimate guide to recording a podcast on your phone.
Steps to set up and use group recording in the Podbean app.
2020-006-Roberto Rodriguez, threat intel, threat hunting, hunter's forge, mordor setup
Full notes and graphics are on www.brakeingsecurity.com
Episode 2020-006
Book club
“And maybe blurb for the cast could go something like this. Book club is starting up again with Hands-On AWS penetration testing with Kali Linux from Gilbert and Caudill. You read and get together to discuss or demo every Monday. Get the book, start reading and meet us for the kick off Monday the 24 at 10pm eastern. The book club meets virtually on zoom, and organizes on slack..get invited like this.”
Book: https://smile.amazon.com/Hands-Penetration-Testing-Kali-Linux/dp/1789136725
NolaCon Training:
https://nolacon.com/training/2020/security-detect-and-defense-ttx
Roberto Rodriguez
Bio
@Cyb3rWard0g on Twitter
Threat Intel vs. Threat Hunting = what’s the difference?
What datasets are you using?
Did you start with any particular dataset, or created your own?
Technique development - what skills are needed?
C2 setup
Detection mechanisms
Honeypots
How can people get involved?
Blacksmith - create ‘mordor’ environment to push scripts to setup honeypot/nets
https://Threathunterplaybook.com
https://github.com/hunters-forge/ThreatHunter-Playbook
https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/lateral_movement/WIN-190815181010.html
https://medium.com/threat-hunters-forge/threat-hunter-playbook-mordor-datasets-binderhub-open-infrastructure-for-open-8c8aee3d8b4
https://medium.com/threat-hunters-forge/writing-an-interactive-book-over-the-threat-hunter-playbook-with-the-help-of-the-jupyter-book-3ff37a3123c7
https://www.exploit-db.com/exploits/47995 - Sudo buffer overflow
Mordor: The Mordor project provides pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files for easy consumption.
YAML Example: https://github.com/hunters-forge/ThreatHunter-Playbook/blob/master/playbooks/WIN-190810201010.yaml
Notebook Example:
https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/lateral_movement/WIN-190810201010.html
Jupyter notebook - Definition: https://jupyter-notebook-beginner-guide.readthedocs.io/en/latest/what_is_jupyter.html
Lateral Movement - WMI - IMAGE Below
SIGMA?
What is a Notebook?
Think of a notebook as a document that you can access via a web interface that allows you to save input (i.e live code) and output (i.e code execution results / evaluated code output) of interactive sessions as well as important notes needed to explain the methodology and steps taken to perform specific tasks (i.e data analysis).
https://medium.com/threat-hunters-forge/threat-hunter-playbook-mordor-datasets-binderhub-open-infrastructure-for-open-8c8aee3d8b4
Have a goal for expanding to other parts of ATT&CK?
Threat Hunter Playbook - Goals
Sub-techniques:
https://medium.com/mitre-attack/attack-sub-techniques-preview-b79ff0ba669a
Slack Channel:
https://launchpass.com/threathunting
Twitter;
https://twitter.com/mattifestation
https://twitter.com/tifkin_
https://twitter.com/choldgraf
https://twitter.com/Cyb3rPandaH
Create your
podcast in
minutes
It is Free