Threat Hunting Week! โ€” THM

GDB HackerOne
1 min readOct 9, 2023

By ๐“ž๐“Ÿ ๐“š๐“ฎ๐“ฟ๐“ฒ๐“ท ใƒƒ | 25 / 09 / 2023

THM{ Threat Hunting Week! โ€” THM }

TryHackMeโ€™s Threat Hunting Week (25th โ€” 29th September)

We are on hunt โ€” Come follow me on this threat hunting

Intro to Threat Emulation

A look into threat emulation practices as a means of assessment.

Threat Intelligence for SOC

Learn how to utilise Threat Intelligence to improve the Security Operations pipeline.

Chapter 1: Threat Hunting: Introduction

Behind the scenes of Threat Hunting โ€” mindset, process, and goals.

Link to the article https://gdbhackerone.medium.com/chapter-1-intro-to-threat-emulation-7330ba8bb170

Chapter 2: Threat Hunting: Foothold Hunting

suspicious activities indicating initial user or host compromise.

Chapter 3: Threat Hunting: Pivoting

Hunting suspicious activities indicating threat propagation across the infrastructure.

Chapter 4: Threat Hunting: Endgame

Learn how to hunt and discover suspicious activities indicating actions on objectives.

Chapter 5: Hunt Me I: Payment Collectors

A Finance Director was recently phished. Can you hunt the logs and determine what damage was done?

Further more will be updated on this page

--

--

GDB HackerOne

Your cybersecurity journey begins here. Let's learn, grow, and secure the digital world together! ๐Ÿ’ป๐ŸŒ๐Ÿ”’