The Pyramid of Pain
The Pyramid of Pain (PoP) was released in 2013 by a skilled security researcher by the name of David Bianco (The Pyramid of Pain, http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html). This model is more of a roadmap for accomplishing "the D's" we covered previously:
Figure 2.1 – The Pyramid of Pain
This model highlights the difficulties that adversaries have when different elements of their campaign are discovered and, importantly, shared. Threat hunting can uncover all of these tiers and, through the application of "the D's," we can harass, frustrate, and stress the adversary, which can cause them to move onto easier targets or make mistakes that, as hunters and defenders, we can capitalize on to evict them from the contested network.
Hash values
As a brief reminder, hashes are calculated through a mathematical function that converts an input into a hexadecimal (0-9, A-F) output. When a file is expressed...