Network-based threat hunting matrix
Attack themesTechniquesThreat actors

Delivery

Last updated Feb 12, 2019

A network mechanism used to distribute the malicious code to the target.

Well known techniques

  • Phishing

Matrix techniques

  • Watering hole
  • Poisoned torrents
  • Phishing

References

Network-based threat hunting matrix

  • Network-based threat hunting matrix
  • bdb6115@rit.edu
  • CptOfEvilMinions
  • CptOfEvilMinion

The deliverable from this project is a MITRE ATT&CK like matrix for network-based threat hunting. In the current landscape of security, we need to monitor endpoints and network traffic. This matrix is a collection of techniques to hunt for on the network with potential mitigations and detections.