{"id":4520,"date":"2025-08-25T16:08:27","date_gmt":"2025-08-25T16:08:27","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=4520"},"modified":"2025-08-25T16:08:27","modified_gmt":"2025-08-25T16:08:27","slug":"hunt-evil-your-practical-guide-to-threat-hunting-part-2","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=4520","title":{"rendered":"Hunt Evil Your Practical Guide to Threat Hunting \u2013 Part 2"},"content":{"rendered":"<p>As we discussed in the <a href=\"https:\/\/codelivly.com\/hunt-evil-your-practical-guide-to-threat-hunting-part-1\/\">Part 1<\/a> , adversaries will come in many forms and will deploy<br \/>a wide variety of different Tactics, Techniques and Procedures (TTPs). In order to defend<br \/>yourself, you must know your enemy. Similarly to how you orient your overall hunting<br \/>plan, the kinds of techniques you use to hunt will depend largely on what you\u2019re trying to<br \/>defend against, which in turn will depend largely on what you\u2019re trying to protect. <\/p>\n<h2 class=\"wp-block-heading\">High Impact Activity to Hunt For<\/h2>\n<p><strong>Here are some high impact activities and TTPs that you can start hunting for<\/strong> <\/p>\n<p>These TTPs are grouped by tactic categories from MITRE\u2019s ATT&amp;CK Matrix.<\/p>\n<h3 class=\"wp-block-heading\">Internal Reconnaissance <\/h3>\n<p>How attackers determine where they\u2019re going <\/p>\n<h4 class=\"wp-block-heading\">Host Enumeration<\/h4>\n<p>Determines details about a local host, which includes establishing an understanding of local user context and local host configuration. User context lets you, as an attacker, know what user you are logged in as and what privileges are allotted to you. Local host configuration includes information about the host itself, including hostname and IP address.  <\/p>\n<h4 class=\"wp-block-heading\">Network enumeration <\/h4>\n<p>Establishes what other hosts are remotely accessible from the local host. Once attackers have compromised an initial host, they will need to determine how to move around the network and where they can go. Network enumeration lets you, as an attacker, see what access the host you are on has and what active connections there are to other systems and assets.<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<h3 class=\"wp-block-heading\">Persistence <\/h3>\n<p>How attackers survive a reboot and simple remediations<\/p>\n<h4 class=\"wp-block-heading\">Scheduled Task Execution <\/h4>\n<p>This is the process of queueing up programs or scripts that can be operationalized at a later point. Tasks can be also scheduled remotely, assuming that the attacker has the authentication to use Remote Procedure Call (RPC). This allows attackers to run programs when a system starts up, or according to a schedule.<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<h4 class=\"wp-block-heading\">DLL Injection <\/h4>\n<p>Using this technique, adversaries will run malicious code by using another process to load and execute the code. This allows adversaries to hide malicious activity by incorporating it as part of a benign or routine process. It also allows attackers to access a system\u2019s process memory and permissions.<\/p>\n<h4 class=\"wp-block-heading\">Registry modification <\/h4>\n<p>The additional values to the RUN and RUNONCE registry key allow for malware binaries to execute upon system boot and session login. This is the most common technique for persistence seen in the last decade. <\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<h3 class=\"wp-block-heading\">Command &amp; Control <\/h3>\n<p>How attackers utilize their tools <\/p>\n<h4 class=\"wp-block-heading\">Common Protocol, Common Port <\/h4>\n<p>Using this method, attackers will seek to hide in plain sight by blending in with routine network traffic. Oftentimes this takes the form of using HTTPS, DNS tunneling, and high-traffic ports to establish<a href=\"https:\/\/codelivly.com\/the-ultimate-guide-to-c2-servers\/\"> command and control. <\/a><\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<h4 class=\"wp-block-heading\">Uncommon Protocol, Uncommon Port <\/h4>\n<p>By utilizing this technique, adversaries bypass heavily monitored ports and send data through uncommon ports. This allows attackers to operate with a high degree of stealth, allowing them to evade detection from both human operators and routine detection systems.  <\/p>\n<p><strong><em>Discover: <a href=\"https:\/\/codelivly.com\/building-a-malicious-backdoor-c2-server-in-python\/\">\u00a0Building a Malicious Backdoor &amp; C2 Server in Python!\u00a0<\/a><\/em><\/strong><\/p>\n<h3 class=\"wp-block-heading\">Lateral Movement <\/h3>\n<p>How attackers move around in your network <\/p>\n<h4 class=\"wp-block-heading\">Pass the Hash (PtH)<\/h4>\n<p>Using this technique, attackers will capture valid password hashes via a Credential Access technique and use that to authenticate themselves. This allows them to bypass using a user\u2019s cleartext password and enables them to perform actions on both local and remote systems. <\/p>\n<h4 class=\"wp-block-heading\">Remote Desktop Protocol <\/h4>\n<p>A remote desktop allows a user to access a computer\u2019s desktop interface using a remote system. If a system\u2019s remote desktop protocol is enabled and an attacker knows their target\u2019s account credentials, the attacker can use that information to gain access to and exploit the target system.<\/p>\n<h4 class=\"wp-block-heading\">Shared Webroot <\/h4>\n<p>If a firm has an internally accessible website or intranet network, attackers may upload malicious content to said website and then execute it using a web browser. Since the content is run under the permissions of the <a href=\"https:\/\/codelivly.com\/hacking-web-servers\/\">Web server<\/a> process, this can result in the attacker gaining local or administrative privileges.<\/p>\n<h4 class=\"wp-block-heading\">Path Interception <\/h4>\n<p>This technique entails placing an executable file in a specific path so that it is mistakenly run by a legitimate application. Examples of this include using unquoted paths, path environment variable misconfigurations, and search order hijacking. This allows adversaries to escalate their privileges if the executable is run as part of a higher privileged process. <\/p>\n<h3 class=\"wp-block-heading\">Exfiltration <\/h3>\n<p>How attackers steal your data <\/p>\n<h4 class=\"wp-block-heading\">DNS Tunneling <\/h4>\n<p>This allows an attacker to transfer encoded data inside of DNS queries. Attackers utilize this method to  bypass common security controls (e.g., firewalls) and exfiltrate sensitive data. <\/p>\n<h4 class=\"wp-block-heading\">SFTP\/SCP Exfiltration <\/h4>\n<p>This allows for usage of SSL to hide details about the traffic. You will need a proxy that can break SSL to intercept and investigate this type of activity. <\/p>\n<p>Consider what adversary techniques you want to focus on and research them as much as you can. Put yourself in the mindset of an attacker and determine how one would carry out each of these techniques if they were breaking into your network and attempting to access your critical assets. This will help you determine what data sets to look at and what techniques to deploy, which we will cover in the next section. <\/p>\n<p>Do not be overwhelmed! Hunting is, in part, an exercise in prioritization. For every insidious tactic that an attacker can use to compromise a system, there is a technique that a stalwart defender can use to repel them. As in all battles, the advantage of being the defender is that you are on your home turf. It is your network, and if you know it and know how to patrol it, you can foresee and stop even the most sophisticated adversaries. <\/p>\n<h2 class=\"wp-block-heading\">Four Primary Threat Hunting Techniques <\/h2>\n<p>Okay, you have your hunting procedures and you have your tools squared away. Now let\u2019s talk about the actual practice of hunting, what techniques are in your arsenal, and some examples of how you can proactively find the adversaries lurking in your network. This is by no means an exhaustive list, these are just a set of general techniques that can be applied in different ways. <\/p>\n<h3 class=\"wp-block-heading\">Techniques  <\/h3>\n<h4 class=\"wp-block-heading\">#1. Searching<\/h4>\n<p>The simplest method of hunting, searching is the process of querying data for specific results or artifacts, and can be performed using many tools. Searching requires finely defined search criteria to prevent result overload. There are two primary factors to keep in mind when carrying out a search: searching too broadly for general artifacts may produce far too many results to be useful, and searching too specifically for artifacts on specific hosts may produce fewer results than may be useful. <\/p>\n<h4 class=\"wp-block-heading\">#2. Clustering<\/h4>\n<p>Clustering is a statistical technique, often carried out with machine learning, that consists of separating groups (or clusters) of similar data points based on certain characteristics out of a larger set of data. Hunters may use clustering for many applications, including outlier detection, due to the fact that it can accurately find aggregate behaviors, such as an uncommon number of instances of a certain occurrence. This technique is most effective when dealing with a large group of data points that do not explicitly share immediately obvious behavioral characteristics. <\/p>\n<h4 class=\"wp-block-heading\">#3. Grouping<\/h4>\n<p>Grouping consists of taking a set of multiple unique artifacts and identifying when multiple of them appear together based on specific criteria. The major difference between grouping and clustering is that in grouping your input is an explicit set of items that are already of interest. Discovered groups within these items of interest may potentially represent a tool or a TTP that an attacker might be using. An important aspect of using this technique consists of determining the specific criteria used to group the items, such as events having occurred during a specific time window. This technique works best when you are hunting for multiple, related instances of unique artifacts, such as the case of isolating reconnaissance commands that were executed within a specific timeframe.<\/p>\n<h4 class=\"wp-block-heading\">#4. Stack Counting <\/h4>\n<p>Also known as stacking, this is one of the most common techniques carried out by hunters to investigate a hypothesis. Stacking involves counting the number of occurrences for values of a particular type, and analyzing the outliers or extremes of those results. The effectiveness of this technique is generally diminished when dealing with large and\/or diverse data sets, but it is most effective with a thoughtfully filtered input (such as endpoints of a similar function, organizational unit, etc.). Analysts should attempt to understand input well enough to predict the volume of the output. For example, if you are given a dataset containing 100k endpoints, stack counting the contents of the WindowsTemp folder on each endpoint across an enterprise will produce an enormous result set. Friendly intelligence can be used to define filters for your input. <\/p>\n<p><strong>Machine Learning Techniques<\/strong><\/p>\n<p>In addition to standard hunting techniques like those listed above, you will find that many investigations and procedures can be enhanced and carried out using various machine learning or data science powered techniques. These techniques can involve creating frameworks of feedback given to automated classification systems. This is known as supervised machine learning, which uses labeled \u201ctraining data\u201d to condition algorithms to make predictions about unlabeled data. This new, unclassified data is what you want the machine to label correctly (based on the training data). <\/p>\n<p>It\u2019s not an absolute necessity that you be able to leverage machine learning techniques in your hunting, but you should be aware of the role they can play, as you will see them referenced in many places including in the rest of this guide. The best hunting tools, such as Sqrrl, should be able to provide you with prebuilt machine learning techniques you can leverage as part of an investigation workflow. <\/p>\n<h3 class=\"wp-block-heading\">Datasets<\/h3>\n<p>The techniques that you use are only a part of planning out your hunt and knowing what you can have at your disposal. You can\u2019t hunt if you don\u2019t have the right data, but what is the right data? The answer to that question will depend on what you\u2019re looking for, but below is a general list of datasets that lend themselves well to hunting and security activities in general <\/p>\n<h4 class=\"wp-block-heading\"><strong>Endpoint Data<\/strong><\/h4>\n<p>Process execution metadataContains information on processes run on specific hosts. Critical metadata associated with process execution includes commandline commands\/arguments and process filenames and ID.Registry access dataContains data related to registry objects, including key and value metadata.File dataInformation on stored files and artifacts kept on a local host. This can include when files were created or modified, as well as size, type, and storage location information.Network dataIdentification of the parent process for a network connection.File prevalenceInformation on how common a file is in your environment.<\/p>\n<h4 class=\"wp-block-heading\">Network Data <\/h4>\n<p>Network session dataContains information on network connections between hosts. Critical metadata associated with network connections including the source IP address, destination IP address, destination port, start time of the connection, and end time\/duration of the connection. This includes Netflow, IPFIX, and similar data sources.Bro logsA widely recommended network monitoring tool that collects connection-based flow data and application protocol metadata (HTTP, DNS, SMTP), specialized for security application.Proxy logsHTTP data that contains information on outgoing web requests, including Internet resources that internal clients are accessing.DNS logsContains data related to DNS domain resolution activity, including domain-to-IP address mappings and identification of internal clients making resolution requests.Firewall logsConnection data that contains information on network traffic at the border of a network, focused on blocked connections.Switch and Router logsInternal netflow, also known as east\/west traffic, in your environment that shows what is going on inside the network behind your perimeter security<\/p>\n<h4 class=\"wp-block-heading\">Security Data <\/h4>\n<p>Threat IntelligenceA broad category of information that includes the indicators and TTPs used by attackers, as well as the operations and campaigns they carry out.AlertsThe automated warnings or notifications created by correlation engine tools like a SIEM or IDS, indicating that a given rule set was violated or certain pattern identified, which might indicate a potential incident.Friendly IntelligenceAnother broad category of information about an organization\u2019s own IT infrastructure, security ecosystem, critical assets, employee information, and business processes. Friendly intel helps hunters orient and understand the environment in which they are hunting and contextualize their investigations.<\/p>\n<h2 class=\"wp-block-heading\">Walkthrough: Hunting for Command &amp;<br \/>Control <\/h2>\n<p>By now you\u2019re determined how to map out how you\u2019re going to be carrying out your hunts and what you\u2019ll be hunting for, and figured out what techniques and resources are at your disposal. It\u2019s time to finally dive in and start finding evil. Walkthrough: Hunting for Command &amp; Control CHAPTER 8 <\/p>\n<p>Even with all this information, the prospect of hunting might still be a little daunting. Perhaps the most effective way of learning how to actually hunt is to learn from examples of applied hunts. In the next two sections, you\u2019ll see 2 example hunt walkthroughs looking for 2 different adversary techniques that you can look through for guidance. Give these a try on your own! You should now have all the information you need at your disposal. <\/p>\n<h3 class=\"wp-block-heading\">Hunting for Command &amp; Control<\/h3>\n<div class=\"wp-block-image\">\n<\/div>\n<h4 class=\"wp-block-heading\">Command &amp; Control (C2) Overview <\/h4>\n<p>Attackers generally build Command and Control (C2) channels into common protocols (ComPro) or custom protocols (CusPro). This enables remote access for attackers into target networks. A few examples of common protocols include HTTP\/S, SSL\/TLS, or DNS. Custom protocols are harder to predict, but include techniques such as encrypting packet data with an XOR cipher. Just like with protocols, attackers generally use common network ports (ComPor) or uncommon network ports (UncPor) for their C2 channels. Examples of standard ports include 80\/TCP (HTTP), 443\/TCP (SSL\/ TLS), 53\/UDP (DNS). Uncommon ports are difficult to predict, but they typically deviate from ports registered with IANA. Attackers can use any combination of protocols and ports, including:<\/p>\n<p>Common Protocol + Common Port<\/p>\n<p>Common Protocol + Uncommon Port<\/p>\n<p>Custom Protocol + Common Port<\/p>\n<p>Custom Protocol + Uncommon Port<\/p>\n<h4 class=\"wp-block-heading\">Example Hypothesis <\/h4>\n<p><strong>Hypothesis<\/strong> <\/p>\n<p>Attackers may be operating on a C2 channel that uses a common protocol on a common network port<\/p>\n<p>Look for unique artifacts pertinent to the protocol you are interested in. For example, if you are interested in identifying C2 in HTTP traffic, then you might consider looking for anomalous domains\/URLs\/User-Agent strings<\/p>\n<h4 class=\"wp-block-heading\">Datasets to Explore <\/h4>\n<p>Datasets used to hunt for C2 depends on what you are hunting for. For identifying use of custom protocols, focus primarily on network session metadata, including: <\/p>\n<p>Netflow (\u201cflow\u201d data in general) <\/p>\n<p>Firewall logs (should log allowed \/ accepted packets) <\/p>\n<p>Bro Conn log <\/p>\n<p>To identify use of common protocols, as in this example, focus on application protocol metadata,<br \/>including:<\/p>\n<p>Proxy logs, IIS logs<\/p>\n<p>DNS resolution logs<\/p>\n<p>Bro HTTP, SSL, DNS, SMTP logs<\/p>\n<h4 class=\"wp-block-heading\">Techniques to Use <\/h4>\n<p><strong>Indicator Search<\/strong> <\/p>\n<p>The value of this approach will be impacted by the value of the indicator. Locally sourced indicators will generally provide a high value because they tend to be timely and relevant to the network or systems you might be trying to protect. These can be gathered from previous incidents or by internal threat intelligence teams.<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p><strong>Common network session indicators<\/strong>: IP address, Port<br \/><strong>Common application protocol indicators:<\/strong> Domain (HTTP, DNS, SSL), URL (HTTP), User-Agent String (HTTP), X.509 Certificate Subject (SSL), X.509 Certificate Issuer (SSL), Email address (SMTP) <\/p>\n<p><strong>Stacking<\/strong> <\/p>\n<p>Stacking is a technique commonly used in many different kinds of hunts. In the case of hunting for command and control activity, a hunter will want to stack for anomalous instances of inbound or outbound traffic. Metadata types that can be used for stacking include: Ports, URLs, X.509 Certs<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p><strong>Machine Learning \u2013 Binary Classification<\/strong> <\/p>\n<p>This involves using machine learning to isolate malicious C2 activity. Supervised machine learning uses labeled training data to make predictions about unlabeled data. Given a set of known good and known bad examples, you can create a binary classifier capable of taking in new transactions and deciding if they look more similar to the good training set or the bad training set. After the classifier is trained, you can feed your HTTP (or other network logs) through it and get back much smaller set of records that require analyst attention.<\/p>\n<h3 class=\"wp-block-heading\">Example Hunt <\/h3>\n<p>Hunting for Command &amp; Control <\/p>\n<p><strong>1. What are you looking for? (Hypothesis)<\/strong>Hypothesis: Attackers may be operating on a C2 channel that uses<strong> custom<br \/>encryption (uncommon protocol) on a common network port<\/strong><br \/>Look for:<br \/>Anomalies in monitored network port channels, i.e. connections that<br \/>do not have protocol artifacts related to the common port you are<br \/>looking at. For example, look for connections that have no identifiable<br \/>HTTP metadata over port 80\/TCP<strong>2. Investigation (Data)<\/strong>Determine what datasets you are using:<br \/>For identifying use of common protocols, you will want to focus primarily<br \/>on application protocol metadata, including:<br \/>Proxy logs, IIS logs<br \/>DNS resolution logs<br \/>Bro HTTP, SSL, DNS, SMTP logs<strong>3. Uncover Patterns and IOCs (Techniques)<\/strong>1. Use a search to identify legitimate protocol connections on a<br \/>common port you will be inspecting, by looking at protocol metadata<br \/>If looking at port 80, search for any HTTP protocol records that<br \/>exist for a given time period<br \/>2. Use a second search to identify all network session metadata (e.g.,<br \/>Netflow, Firewall, etc.) on the common port for the same time period<br \/>used in step 1<br \/>3. Using the output of steps 1 and 2, remove the legitimate protocol<br \/>connections from the session data. This should leave uncommon<br \/>protocol connections on the common port<br \/>4. Take the results of step 3 and stack the data for what is useful to<br \/>investigating your hypothesis<br \/>For example: destination IP, bytes transferred, connection<br \/>duration\/length, etc.<strong>4. . Inform and Enrich Analytics (Takeaways)<\/strong>The destination IP addresses involved in the C2 activity you have discovered can be taken as IOCs and added to an indicator database in order to expand automated detection systems. <\/p>\n<p>You can also create packet-level signatures to trigger alerts for cases<br \/>where the custom protocol you have discovered may appear again.<\/p>\n<h2 class=\"wp-block-heading\">Walkthrough: Hunting for Internal Reconnaissance <\/h2>\n<p>Internal reconnaissance belongs to the 7th and final step of the kill chain: Act on Objectives. Internal reconnaissance is the process of collecting internal information about a target network, so that an attacker can more effectively move through the network and conduct further activities<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<h3 class=\"wp-block-heading\">Process enumeration <\/h3>\n<p>After gaining access to a host or network, an attacker will use this process to attempt to establish what processes are running on the local host and the surrounding hosts. The commands used by attackers for process enumeration will depend on whether the attacker is looking for specific services (i.e. critical processes that run at startup and in the background) or general processes. Specifically on Windows, commands that an attacker might use for identifying services, running services, and scheduled processes include but are not limited to: <\/p>\n<p><strong>Identifying Scheduled<br \/>Processes<\/strong><strong>Identifying Running<br \/>Processes<\/strong><strong>Identifying Scheduled<br \/>Processes<\/strong>net starttasklistatsc queryGet-Process (Powershell)schtasks \/querygsv (PowerShell)gps (PowerShell)Get-ScheduledTask (PowerShell)Get-Service (Powershell)process (WMIC)Get-ScheduledJob (Powershell)service (WMIC)process (WMIC)job (WMIC)<\/p>\n<h4 class=\"wp-block-heading\">Datasets to explore <\/h4>\n<p>For internal reconnaissance, there are two major data types that are useful in a hunt: process execution metadata and network connection metadata. In this context, critical metadata associated with process execution includes command-line commands\/arguments and process filenames. This metadata should include the name of the host that the process was executed on and the name of the user who executed the process. Critical metadata associated with network connections include the source IP address, destination IP address, destination port, start time of the connection, and end time\/duration of connections. For hunting network enumeration with this type of metadata, it\u2019s best to have data that includes internal-to-internal connections between hosts on a local subnet.<\/p>\n<p>Process Execution Data Tools Network Connection Data ToolsSysmonBroPowerShell auditingNetflowProcess creation auditing<\/p>\n<h3 class=\"wp-block-heading\">Techniques to Use<\/h3>\n<h4 class=\"wp-block-heading\">#1. Searching<\/h4>\n<p>Searching for internal reconnaissance commands and patterns can be useful if the search includes thoughtful filtering, especially based on friendly intelligence. To make this technique effective at finding internal reconnaissance, it\u2019s best to have an explicit goal in mind such as searching for command execution of \u2018whoami\u2019 on across a particular class of workstations that should not normally execute the command (e.g., C-suite laptops). <\/p>\n<h4 class=\"wp-block-heading\">#2. Grouping<\/h4>\n<p>Grouping for internal reconnaissance commands is similar to searching, except you can review multiple artifacts across multiple assets in one result set. It\u2019s valuable to take commands related to a specific architecture (e.g., Windows), put them into a single group, and look for the execution of the group on a single asset. This technique works best when you are hunting for multiple, related instances of unique artifacts. <\/p>\n<h4 class=\"wp-block-heading\">#3. Visualizations<\/h4>\n<p>Multiple visualizations may be applied to hunting for internal reconnaissance, but for this example, we will focus on one: box plots. Box plots visually describe distribution of data, with a box that represents median values and whiskers that represent high and low values (outliers). It may be useful to visualize the frequency and variety of command execution across hosts, as well as command execution across hosts across time.  <\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p>Above is a box plot of the number of recon commands executed by workstations and servers. There are 17 hosts in the dataset and each host may have executed up to 8 unique commands related to internal reconnaissance. The three potential points of interest are the two workstation upper outliers and the one server upper outlier. <\/p>\n<p>That\u2019s all for threat Hunting . <\/p>\n<p> <strong>Enjoyed this article?<\/strong><br \/>We\u2019d love to hear your thoughts! <br \/>Stay connected with us on social media for more cybersecurity tips, tutorials, and updates. <\/p>\n<p> Follow us: [<a href=\"https:\/\/www.instagram.com\/codelivly\" target=\"_blank\" rel=\"noopener\">Instagram<\/a>] | [<a href=\"https:\/\/www.x.com\/codelivly\" target=\"_blank\" rel=\"noopener\">Twitter\/X<\/a>] | [<a href=\"http:\/\/t.me\/codelivly\" target=\"_blank\" rel=\"noopener\">Telegram<\/a>]  | [<a href=\"http:\/\/facebook.com\/codelivly\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>] <br \/> Explore more: [<a href=\"http:\/\/store.codelivly.com\/\">Codelivly Store<\/a>] \u2013 grab exclusive books &amp; guides to level up your hacking skills.<\/p>","protected":false},"excerpt":{"rendered":"<p>As we discussed in the Part 1 , adversaries will come in many forms and will deploya wide variety of different Tactics, Techniques and Procedures (TTPs). In order to defendyourself, you must know your enemy. Similarly to how you orient your overall huntingplan, the kinds of techniques you use to hunt will depend largely on [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":4521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4520","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4520"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4520"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4520\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/4521"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}