Advanced Security #threat-hunting #IOC-vs-IOA #MITRE-ATT&CK #hypothesis-driven

Threat Hunting

5 exercises — master threat hunting vocabulary: proactive vs reactive detection, hypothesis-driven vs intelligence-driven hunting, IOC vs IOA and the Pyramid of Pain, writing TTP-based hunt hypotheses with pivot points, and stacking / baseline deviation / time-series techniques. Plus: how to write a hunt report even when no threat is found.

0 / 5 completed
Threat hunting quick reference
  • Threat hunting — proactive, human-led: assumes breach and looks for undetected adversary activity. No triggering alert needed.
  • Hypothesis-driven: hunter formulates a testable theory ("if attacker uses T1003, we'd see X in Y data source"). Intelligence-driven: hunt triggered by a specific threat intel report about an actor's TTPs.
  • IOC (file hash, IP, domain) — tactical, easy for attacker to change. IOA (attacker behaviour/technique) — strategic, hard to change. ← Pyramid of Pain
  • Pivot points: parent process, user account, file hash, destination host — artefacts you chase from a suspicious finding to extend the investigation.
  • Stacking: rank by frequency → low-count outliers = potentially malicious. Baseline deviation: compare current to historical normal. Time-series anomaly: detect sudden spikes/drops (e.g., DNS tunnelling).
  • Hunt report: include hypothesis, data sources, queries, findings, coverage gaps discovered, and recommended new detection rules. "No evidence found" is a valid and valuable outcome.
1 / 5

A threat analyst explains their team's approach to a new hire: "We don't wait for alerts — we go looking for threats that haven't fired any detections. That's threat hunting. But there's an important difference between hypothesis-driven and intelligence-driven hunting, and both are different from just reacting to alerts."

What is threat hunting, what distinguishes hypothesis-driven from intelligence-driven, and how does it differ from alert-driven detection?