Browse Skills

Hunting For Persistence Via Wmi Subscriptions

v1.0.0

Hunt for adversary persistence through Windows Management Instrumentation event subscriptions by monitoring WMI consumer, filter, and binding creation events that execute malicious code triggered by system events.

mukul975
3

Hunting For Persistence Mechanisms In Windows

v1.0.0

Systematically hunt for adversary persistence mechanisms across Windows endpoints including registry, services, startup folders, and WMI subscriptions.

mukul975
4

Hunting For Ntlm Relay Attacks

v1.0.0

Detect NTLM relay attacks by analyzing Windows Event 4624 logon type 3 with NTLMSSP authentication, identifying IP-to-hostname mismatches, Responder traffic signatures, SMB signing status, and suspicious authentication patterns across the domain.

mukul975
6

Hunting For Lolbins Execution In Endpoint Logs

v1.0.0

Hunt for adversary abuse of Living Off the Land Binaries (LOLBins) by analyzing endpoint process creation logs for suspicious execution patterns of legitimate Windows system binaries used for malicious purposes.

mukul975
4

Hunting For Living Off The Land Binaries

v1.0.0

Proactively hunt for adversary abuse of legitimate system binaries (LOLBins) to execute malicious payloads while evading detection.

mukul975
3

Hunting For Living Off The Cloud Techniques

v1.0.0

Hunt for adversary abuse of legitimate cloud services for C2, data staging, and exfiltration including abuse of Azure, AWS, GCP services, and SaaS platforms.

mukul975
2

Hunting For Lateral Movement Via Wmi

v1.0.0

Detect WMI-based lateral movement by analyzing Windows Event ID 4688 process creation and Sysmon Event ID 1 for WmiPrvSE.exe child process patterns, remote process execution, and WMI event subscription persistence.

mukul975
4

Hunting For Domain Fronting C2 Traffic

v1.0.0

Detect domain fronting C2 traffic by analyzing SNI vs HTTP Host header mismatches in proxy logs and TLS certificate discrepancies using pyOpenSSL for certificate inspection

mukul975
3

Hunting For Dns Tunneling With Zeek

v1.0.0

Detect DNS tunneling and data exfiltration by analyzing Zeek dns.log for high-entropy subdomain queries, excessive query volume, long query lengths, and unusual DNS record types indicating covert channel communication.

mukul975
3

Hunting For Dns Based Persistence

v1.0.0

Hunt for DNS-based persistence mechanisms including DNS hijacking, dangling CNAME records, wildcard DNS abuse, and unauthorized zone modifications using passive DNS databases, SecurityTrails API, and DNS audit log analysis.

mukul975
3

Hunting For Defense Evasion Via Timestomping

v1.0.0

>

mukul975
3

Hunting For Dcsync Attacks

v1.0.0

Detect DCSync attacks by analyzing Windows Event ID 4662 for unauthorized DS-Replication-Get-Changes requests from non-domain-controller accounts.

mukul975
2