Threat Hunting
5 exercises — master threat hunting vocabulary: proactive vs reactive detection, hypothesis-driven vs intelligence-driven hunting, IOC vs IOA and the Pyramid of Pain, writing TTP-based hunt hypotheses with pivot points, and stacking / baseline deviation / time-series techniques. Plus: how to write a hunt report even when no threat is found.
- Threat hunting — proactive, human-led: assumes breach and looks for undetected adversary activity. No triggering alert needed.
- Hypothesis-driven: hunter formulates a testable theory ("if attacker uses T1003, we'd see X in Y data source"). Intelligence-driven: hunt triggered by a specific threat intel report about an actor's TTPs.
- IOC (file hash, IP, domain) — tactical, easy for attacker to change. IOA (attacker behaviour/technique) — strategic, hard to change. ← Pyramid of Pain
- Pivot points: parent process, user account, file hash, destination host — artefacts you chase from a suspicious finding to extend the investigation.
- Stacking: rank by frequency → low-count outliers = potentially malicious. Baseline deviation: compare current to historical normal. Time-series anomaly: detect sudden spikes/drops (e.g., DNS tunnelling).
- Hunt report: include hypothesis, data sources, queries, findings, coverage gaps discovered, and recommended new detection rules. "No evidence found" is a valid and valuable outcome.
A threat analyst explains their team's approach to a new hire: "We don't wait for alerts — we go looking for threats that haven't fired any detections. That's threat hunting. But there's an important difference between hypothesis-driven and intelligence-driven hunting, and both are different from just reacting to alerts."
What is threat hunting, what distinguishes hypothesis-driven from intelligence-driven, and how does it differ from alert-driven detection?
Comparison: alert-driven vs threat hunting
| Alert-driven (reactive) | Threat hunting (proactive) | |
|---|---|---|
| Trigger | SIEM rule fires an alert | Hunter-initiated: hypothesis or intel report |
| Starting assumption | Something suspicious was detected | Adversary may already be present, undetected |
| Coverage | Only catches threats matching written rules | Can discover novel threats with no existing rule |
| Output | Alert requiring triage | Confirmed finding OR new detection rule OR "no evidence found" |
| Analyst level | Tier 1–2 | Senior analyst / threat intel specialist |
Hypothesis examples:
• "If an APT group has compromised credentials, they may use them in off-hours from an unusual geographic location — let me check for late-night authentications from new countries for our top-privilege accounts."
• "Based on the Lazarus Group report, they use DLL side-loading via legitimate Windows system binaries. Let me hunt for unusual parent-child process relationships involving lsass.exe and winlogon.exe."
Key vocabulary:
• Threat hunting — proactive, human-led search for undetected adversary activity; starts without a triggering alert; assumes breach and looks for evidence
• Hypothesis-driven hunting — hunter formulates a testable theory about how an attacker might behave in the specific environment, then searches data to test it
• Intelligence-driven hunting — hunt triggered by specific threat intel (a new APT report, a known TTP); hunter searches for that exact pattern in the environment
• Hunter mindset — "assume breach" — operating under the assumption that adversaries may already be inside, rather than waiting for proof; drives proactive investigation