Главная
Study mode:
on
1
Introduction
2
What is Hunting
3
Normal Hunt Cycle
4
Hypothesis Driven Hunting
5
Benefits
6
HypothesisDriven Hunting
7
Hacker Lifecycle
8
Mitre Attack Framework
9
Tactics Techniques Procedures
10
Tactics
11
Procedures
12
Why is this useful
13
What is this process
14
Building the hunt hypothesis
15
Identifying the tactic
16
Identifying the procedures
17
Scope
18
Documentation
19
Conclusion
20
Benefit
21
Tactics and Techniques
22
Access Token Manipulation
23
Windows Authentication
24
Access tokens
25
Token types
26
General overview
27
Token impersonation
28
Visualization
29
Create a Process
30
Make an Impostor Token
31
Create a New logon session
32
Collection Requirements
33
Collecting Access Tokens
34
Get Access Token
35
Impersonation
36
GetSystem
37
Kerberos ticket granting ticket
38
Get Kerberos ticket granting ticket
39
Make token attack
40
Scope of analysis
41
Excluded factors
42
Demo
43
Questions
Description:
Explore the fundamentals of threat hunting and learn how to generate effective hunt hypotheses in this Black Hat conference talk. Discover the often-overlooked first step in the threat hunting process, which can guide targeted collection and analysis of forensic artifacts. Delve into the benefits of hypothesis-driven hunting, the hacker lifecycle, and the MITRE ATT&CK framework. Gain insights into building hunt hypotheses, identifying tactics and procedures, and properly scoping and documenting your hunt. Focus on access token manipulation in Windows authentication, understanding token types, impersonation, and visualization techniques. Learn about collection requirements for access tokens and explore various attack methods, including creating impostor tokens and new logon sessions. Conclude with a demonstration and Q&A session to solidify your understanding of this critical cybersecurity approach.

A Process is No One - Hunting for Token Manipulation

Black Hat
Add to list