Cyber Threat Hunting: Become an Expert with These 4 Videos!

Josh Campbell|February 2, 2021
Blog

If you have been looking for useful resources for cyber threat hunting, we’ve got you covered. We have put together 4 videos that will help you become a better threat hunter in no time! Join Austin Jackson as he tackles some of the biggest vulnerabilities and techniques that attackers use. Looking at how they work, what they do, and how you can better defend your organizations!

New call-to-action

A Deep Dive into the SUNBURST Backdoor

What cyber threat hunting list wouldn’t be complete without something on SUNBURST?

The SUNBURST implant was a part of the SolarWinds’ supply chain attack. This attack rocked the security industry and is the largest attack on the US government in years! The implant once active would download a secondary Cobalt Strike payload. While the full details will likely remain classified, we take a look at the implant to see what else we could learn.

Exim Mail Transfer Agent – The Return of the WIZard!

A vulnerability that anyone in cyber threat hunting should know is CVE-2019-10149. This vulnerability affects one of the most common mail servers on the Internet, Exim. This could allow an attacker to perform remote code execution (RCE) on the server as root. We look at how the vulnerability works, and what the impact is to organizations.

Application Shimming for Fun and Profit!

No cyber threat hunting repertoire is not complete without knowledge of application shimming. This is a technique (T1546.011) often used for persistence and privilege escalation. One of the most infamous adversaries to use this technique is FIN7. They used it in their Pillowmint malware that targets point-of-sale systems. Austin dives into this to explore how the technique works. Definitely something everyone in cyber threat hunting should know!

Yet Another Apache Struts Vulnerability…

If ever there was a truism in cyber threat hunting it would be that Apache Struts is being targeted. And 2020 was no exception to that rule. Austin takes a hard look at CVE-2020-17530 affecting Apache Struts version 2.0.0-2.5.25. Austin also developed a proof of concept for those in cyber threat hunting to explore how to exploit it.

Conclusion

If you would do some cyber threat hunting That'd be great...

The one rule for those in the field of threat hunting is to never stop learning! Cyborg Security continues to put out content aimed at hunters in our Cyborg Labs blogs! If you want to dive into more threat hunting content, check out our latest threat hunting how-to. In it we explore methods for hunting for persistence in the registry.


New call-to-action

Blog

Josh Campbell

Threat Intelligence Lead
Follow Cyborg
  • Twitter
  • linked in

DISCOVER EVEN MORE

White Paper

September 2, 2021

Expectation vs Reality: Debunking 5 (More) Myths About Threat Hunting
Read more
White Paper

August 26, 2021

From a Global Man Hunt to a Cyber Threat Hunt
Read more
White Paper

August 19, 2021

Logs & You: Explaining Threat Hunting to Non-Threat Hunters
Read more

SUBSCRIBE TO OUR NEWSLETTER

Continue the Hunt
No thanks, maybe later.