Setting up a research environment
Before we can carry out a hunt in our production environment, we need to prepare a laboratory environment in which we are going to emulate the threats we want to hunt for. There isn't a unique or right way to build a research environment. The requirements will change, depending on where and what you are planning to deploy. You may want to create a lab so that you can do research by yourself, or you may want to deploy a lab that will mimic your organization's infrastructure, allowing you to emulate the adversary in order to carry out hunts in a production environment later on. You could also create a research environment that focuses more on network traffic analysis than on host-related artifacts.
In this chapter, we are going to build a research environment pretty similar to the one I host myself that's described by Roberto Rodriguez in his personal blog: Setting up a Pentesting… I mean, a Threat Hunting Lab (https://cyberwardog...