paint-brush
Threat Hunting the Easy Wayby@chrisray
396 reads
396 reads

Threat Hunting the Easy Way

by Chris Ray4mNovember 30th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The first step is to become familiar with attacker TTPs, tactics techniques and procedures, the real attacker thingies they do. If your organization has an application that runs on several servers you need to get familiar with the behavior of the admins of these servers and the operation of the servers. When you feel you understand the technology, you're probably done. When you know what technology or security solutions you have in your environment I will try to stay general and give broad advice here. The advice that you find online isn’t pragmatic. It’s hard to find advice that can directly apply to your environment or systems.

Company Mentioned

Mention Thumbnail
featured image - Threat Hunting the Easy Way
Chris Ray HackerNoon profile picture
Chris Ray

Chris Ray

@chrisray

Chris Ray is a senior member of a local 35+ B-league hockey team and also occasionally blogs about cybersecurity topics.

About @chrisray
LEARN MORE ABOUT @CHRISRAY'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Chris Ray HackerNoon profile picture
Chris Ray@chrisray
Chris Ray is a senior member of a local 35+ B-league hockey team and also occasionally blogs about cybersecurity topics.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite