category

Threat Hunting

Kerberoasting and Its Modern Variants: Why Classic Detection Still Misses Half the Attacks
Classic Kerberoasting detection looks for RC4 TGS requests. Attackers switched to AES years ago. Targeted Kerberoasting, roasting with machine accounts, and AS-REP roasting all have different signatures. This covers all variants and how to hunt each one.
BYOVD: Bring Your Own Vulnerable Driver — Killing EDR at the Kernel Level
Bring Your Own Vulnerable Driver is now standard ransomware tradecraft. The attacker loads a legitimate but vulnerable signed driver, uses it to gain kernel execution, and kills your EDR before you know they are there. This is how to hunt for it.
Getting Started with Zeek for Network Threat Hunting
Zeek is one of those tools that looks overwhelming at first. After a few weeks of using it in a lab environment, here is how I actually got it to a useful state.
Writing Sigma Rules That Actually Work
A week of trialling Sigma rules against a real lab environment. A lot of public rules are too noisy to be useful without tuning.
Hunting Cobalt Strike Beacons in Network Traffic
Cobalt Strike is everywhere in incident reports. Understanding the default beacon traffic patterns makes hunting it more approachable than most people expect.
Writing Your First Yara Rule: From Sample to Signature
Yara rules feel mysterious until you write one from scratch against a real malware sample.
Malicious PowerShell: What to Look For and Where to Find It
PowerShell is used in almost every modern intrusion at some point. Covering the logging setup you need and how to cut through the noise.
Why Proactive Threat Hunting Matters: A Primer
Waiting for alerts to fire means the attacker is already inside. This primer covers what proactive threat hunting actually means, how to form testable hypotheses, and the data sources you need before you can hunt anything.
Building Useful Splunk Dashboards for a Home SOC
Most Splunk tutorials show dashboards with clean data. Real log data is messy. The searches that actually work.
Detecting Mimikatz Without Signature-Based Rules
Mimikatz has hundreds of variants and most AV signatures fall behind. Behavioural detection approaches that catch it regardless of version.