Network-based threat hunting matrix
Attack themesTechniquesThreat actors

Internal recon

Last updated Feb 12, 2019

The attacker explores the victim’s environment to gain a better understanding of the environment, the roles and responsibilities of key individuals, and to determine where an organization stores information of interest.

Matrix techniques

  • Service enumeration
  • Port scanning
  • Network sniffing

References

  • Attack Life Cycle

Network-based threat hunting matrix

  • Network-based threat hunting matrix
  • bdb6115@rit.edu
  • CptOfEvilMinions
  • CptOfEvilMinion

The deliverable from this project is a MITRE ATT&CK like matrix for network-based threat hunting. In the current landscape of security, we need to monitor endpoints and network traffic. This matrix is a collection of techniques to hunt for on the network with potential mitigations and detections.