Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Threat Hunting with Elastic Stack

You're reading from   Threat Hunting with Elastic Stack Solve complex security challenges with integrated prevention, detection, and response

Arrow left icon
Product type Paperback
Published in Jul 2021
Publisher Packt
ISBN-13 9781801073783
Length 392 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Andrew Pease Andrew Pease
Author Profile Icon Andrew Pease
Andrew Pease
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Preface 1. Section 1: Introduction to Threat Hunting, Analytical Models, and Hunting Methodologies
2. Chapter 1: Introduction to Cyber Threat Intelligence, Analytical Models, and Frameworks FREE CHAPTER 3. Chapter 2: Hunting Concepts, Methodologies, and Techniques 4. Section 2: Leveraging the Elastic Stack for Collection and Analysis
5. Chapter 3: Introduction to the Elastic Stack 6. Chapter 4: Building Your Hunting Lab – Part 1 7. Chapter 5: Building Your Hunting Lab – Part 2 8. Chapter 6: Data Collection with Beats and Elastic Agent 9. Chapter 7: Using Kibana to Explore and Visualize Data 10. Chapter 8: The Elastic Security App 11. Section 3: Operationalizing Threat Hunting
12. Chapter 9: Using Kibana to Pivot Through Data to Find Adversaries 13. Chapter 10: Leveraging Hunting to Inform Operations 14. Chapter 11: Enriching Data to Make Intelligence 15. Chapter 12: Sharing Information and Analysis 16. Assessments 17. Other Books You May Enjoy

Questions

As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:

  1. What was the persistence technique observed in the example in this chapter?

    a. Attributes

    b. Scheduled task

    c. Deleting files

    d. Running in memory

  2. What was the defense evasion technique observed in the example in this chapter?

    a. Scheduled task

    b. Deleting files

    c. Setting attributes

    d. Running as SYSTEM

  3. What is an EICAR file?

    a. A harmless anti-virus test file

    b. A process hooking technique

    c. A memory injection tool

    d. A Kibana template

  4. What do Actions in Task Scheduler show us?

    a. Who to run the scheduled task as

    b. Who to connect to and report the status of the scheduled task

    c. When a scheduled task runs

    d. What the scheduled task does

  5. How do you remove a hidden attribute from a file?

    a. attrib -h

    b. attrib +h

    c. attrib -d

    d. attrib -all

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime