Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixed markdown formattings of headlines #16

Open
wants to merge 5 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion hunts/analyze_producer_consumer_ratio.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Producer-Consumer Ratio for Detecting Data Exfiltration
# Analyze Producer-Consumer Ratio for Detecting Data Exfiltration

**Purpose**: Find changes in traffic flows that indicate exfil

Expand Down
2 changes: 1 addition & 1 deletion hunts/beacon_detection_via_intra_request_time_deltas.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Beacon Detection via Intra-Request Time Deltas
# Beacon Detection via Intra-Request Time Deltas

**Purpose**: Find regular HTTP beaconing behavior which may indicate malware C2

Expand Down
2 changes: 1 addition & 1 deletion hunts/checking-how-outsiders-see-you.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Checking How Outsiders See You
# Checking How Outsiders See You

**Purpose**: Determine whether any of your web sites are serving malware by using third party opinions

Expand Down
2 changes: 1 addition & 1 deletion hunts/dynamic_dns_c2.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#C2 via Dynamic DNS
# C2 via Dynamic DNS

**Purpose**: Identify potential C2 activity

Expand Down
2 changes: 1 addition & 1 deletion hunts/http_uri_analysis.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Finding the Unknown with HTTP URIs
# Finding the Unknown with HTTP URIs

**Purpose**: Identify things signatures have not been created for in relation to network traffic behavior.

Expand Down
2 changes: 1 addition & 1 deletion hunts/http_user_agent_analysis.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#HTTP User-Agent Analysis
# HTTP User-Agent Analysis

**Purpose**: Identify malware by analyzing the User-Agent strings they present

Expand Down
2 changes: 1 addition & 1 deletion hunts/internet_facing_http_request_analysis.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Internet-Facing HTTP Request Analysis
# Internet-Facing HTTP Request Analysis

**Purpose**: Identify common patterns of HTTP-based attacks

Expand Down
2 changes: 1 addition & 1 deletion hunts/lateral_movement_detection_via_process_monitoring.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Lateral Movement Detection via Process Monitoring
# Lateral Movement Detection via Process Monitoring

**Purpose**

Expand Down
4 changes: 2 additions & 2 deletions hunts/net_session_c2.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Finding C2 in Network Sessions
# Finding C2 in Network Sessions

**Purpose**

Expand Down Expand Up @@ -26,4 +26,4 @@ C2 can appear anywhere in the stacked results, but as a start, it may be useful

**More Info**

_None at this time._
_None at this time._
2 changes: 1 addition & 1 deletion hunts/ntfs_extended_attribute_analysis.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#NTFS Extended Attribute Analysis
# NTFS Extended Attribute Analysis

**Purpose**: Identify data hiding in extended attributes on files in an NTFS filesystem, which are otherwise rarely used.

Expand Down
2 changes: 1 addition & 1 deletion hunts/privileged-group-tracking.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Privileged Group Tracking
# Privileged Group Tracking

**Purpose**

Expand Down
2 changes: 1 addition & 1 deletion hunts/psexec-windows-events.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Psexec Windows Events
# Psexec Windows Events

**Purpose**:
Find instances of psexec service (remote command execution) on Windows sytems by examining event logs pertaining to access control for remote shares.
Expand Down
2 changes: 1 addition & 1 deletion hunts/ram_dumping.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#RAM Dumping
# RAM Dumping

**Purpose**: Examine memory dumps of an individual system, looking for signs of malware or other malicious activities

Expand Down
2 changes: 1 addition & 1 deletion hunts/rdp_external_access.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#RDP External Access
# RDP External Access

**Purpose**: Identify abnormal incoming RDP requests

Expand Down
2 changes: 1 addition & 1 deletion hunts/rogue_listeners.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Search for Rogue Listeners
# Search for Rogue Listeners

**Purpose**: Find malicious programs that are listening to network ports

Expand Down
4 changes: 2 additions & 2 deletions hunts/shimcache_amcache.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Shimcache/Amcache
# Shimcache/Amcache

**Purpose**: Identify potential malware by finding "rare" binaries executed across endpoints.

Expand All @@ -21,4 +21,4 @@ Stack count the filenames and/or directory paths to find rare files executed, ra
- [ShimCacheParser](https://github.com/mandiant/ShimCacheParser), Mandiant
- [amcache.py](https://gist.github.com/williballenthin/ee512eacb672320f2df5#file-amcache_py_examples-md), Will Ballenthin
- [Intrusion Hunting for the Masses](https://www.youtube.com/watch?v=YLgycMCPo4c), David Sharpe (HackMiami 2016)
- [ShimShady: Live Investigations of the Application Compatibility Cache](https://www.fireeye.com/blog/threat-research/2015/10/shim_shady_live_inv.html), Fred House, Claudiu Teodorescu, Andrew Davis (FireEye)
- [ShimShady: Live Investigations of the Application Compatibility Cache](https://www.fireeye.com/blog/threat-research/2015/10/shim_shady_live_inv.html), Fred House, Claudiu Teodorescu, Andrew Davis (FireEye)
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Suspicious Process Creation via Windows Event Logs
# Suspicious Process Creation via Windows Event Logs

**Purpose**

Expand Down
2 changes: 1 addition & 1 deletion hunts/windows_autoruns_analysis.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Autoruns Analysis
# Autoruns Analysis

**Purpose**: Find malware persistence by examining common mechanisms across a network

Expand Down
2 changes: 1 addition & 1 deletion hunts/windows_driver_analysis.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Windows Driver Analysis
# Windows Driver Analysis

**Purpose**: Find malware running in Windows drivers across a network

Expand Down
2 changes: 1 addition & 1 deletion hunts/windows_prefetch_cache_analysis.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Windows Prefetch Cache Analysis
# Windows Prefetch Cache Analysis

**Purpose**: Identify malware or other suspicious executables that ran on a system.

Expand Down
2 changes: 1 addition & 1 deletion hunts/windows_service_analysis.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
#Windows Service Analysis
# Windows Service Analysis

**Purpose**: Find suspicious Windows services running across a network

Expand Down