A Process is No One: Hunting for Token Manipulation

Presented at DerbyCon 8.0 Evolution (2018), Oct. 5, 2018, 12:30 p.m. (25 minutes).

Does your organization want to start Threat Hunting, but you’re not sure how to begin? Most people start with collecting ALL THE DATA, but data means nothing if you’re not able to analyze it properly. This talk begins with the often overlooked first step of hunt hypothesis generation which can help guide targeted collection and analysis of forensic artifacts. We will demonstrate how to use the MITRE ATTACK Framework and our five-phase Hypothesis Generation Process to develop actionable hunt processes, narrowing the scope of your Hunt operation and avoiding “analysis paralysis.” We will then walk through a detailed case study of detecting access token impersonation/ manipulation from concept to technical execution by way of the Hypothesis Generation Process.


Presenters:

Links:

Similar Presentations: