Active Countermeasures https://www.activecountermeasures.com AI-Hunter analyzes your network to identify which of your internal systems have been compromised. Fri, 19 Oct 2018 20:02:46 +0000 en-US hourly 1 https://wordpress.org/?v=4.9.8 https://www.activecountermeasures.com/wp-content/uploads/2018/08/favicon-150x150.png Active Countermeasures https://www.activecountermeasures.com 32 32 Should Threat Hunting Be a Standards Requirement? https://www.activecountermeasures.com/should-threat-hunting-be-a-standards-requirement/ Tue, 02 Oct 2018 09:30:11 +0000 https://www.activecountermeasures.com/?p=5624 As part of some recent research, I was looking at which security standards and attestations require regular threat hunts. Imagine my surprise when […]

The post Should Threat Hunting Be a Standards Requirement? appeared first on Active Countermeasures.

]]>
AI-Hunter v1.2.1 Has Been Released! https://www.activecountermeasures.com/ai-hunter-v1-2-1-has-been-released/ Mon, 01 Oct 2018 14:07:13 +0000 https://www.activecountermeasures.com/?p=5613 Hi folks! We are proud to say that version 1.2.1 of AI-Hunter has just been released! You can access this latest version via […]

The post AI-Hunter v1.2.1 Has Been Released! appeared first on Active Countermeasures.

]]>
Threat Hunting Beacon Analysis Webcast from September 11, 2018 https://www.activecountermeasures.com/threat-hunting-beacon-analysis-webcast-from-september-11-2018/ Tue, 11 Sep 2018 09:00:17 +0000 http://www-test.activecountermeasures.com/?p=5417 Below is the link to the slides from our 9/11/18 talk on performing a threat hunting beacon analysis. Thank you to everyone who […]

The post Threat Hunting Beacon Analysis Webcast from September 11, 2018 appeared first on Active Countermeasures.

]]>
YCombinator Startup School https://www.activecountermeasures.com/ycombinator-startup-school/ Thu, 06 Sep 2018 09:00:06 +0000 http://www-test.activecountermeasures.com/?p=5414 Active Countermeasures is excited to announce that we have been accepted into YCombinator’s Startup School. YCombinator (“YC” for short) is arguably one of […]

The post YCombinator Startup School appeared first on Active Countermeasures.

]]>
Tightly Defining Cyber Threat Hunting https://www.activecountermeasures.com/tightly-defining-cyber-threat-hunting/ Tue, 04 Sep 2018 14:51:49 +0000 http://www-test.activecountermeasures.com/?p=4056 I briefly considered titling this blog entry “Why Threat Hunting Scope Creep Will Swallow Your Soul”, because I’ve spoken with quite a few […]

The post Tightly Defining Cyber Threat Hunting appeared first on Active Countermeasures.

]]>
DNS Backdoors? https://www.activecountermeasures.com/dns-backdoors/ Tue, 28 Aug 2018 17:38:56 +0000 http://www-test.activecountermeasures.com/?p=3376 There has been a lot of confusion about DNS backdoors and how hard they are or ar not to detect.  I wanted to […]

The post DNS Backdoors? appeared first on Active Countermeasures.

]]>
Tshark Examples for Extracting IP Fields https://www.activecountermeasures.com/blog-tshark-examples-for-extracting-ip-fields/ https://www.activecountermeasures.com/blog-tshark-examples-for-extracting-ip-fields/#comments Wed, 22 Aug 2018 14:03:31 +0000 https://www.activecountermeasures.com/?p=1672 In a previous blog entry, I referenced using tshark to extract IP header information so that it could be sorted and analyzed. I […]

The post Tshark Examples for Extracting IP Fields appeared first on Active Countermeasures.

]]>
https://www.activecountermeasures.com/blog-tshark-examples-for-extracting-ip-fields/feed/ 1
Wireshark For Network Threat Hunting: Creating Filters https://www.activecountermeasures.com/blog-wireshark-for-network-threat-hunting-creating-filters/ https://www.activecountermeasures.com/blog-wireshark-for-network-threat-hunting-creating-filters/#comments Mon, 20 Aug 2018 11:02:28 +0000 https://www.activecountermeasures.com/?p=1640 Let’s say you have a system you believe to be compromised.  And, let’s say you can get a packet capture from that system. […]

The post Wireshark For Network Threat Hunting: Creating Filters appeared first on Active Countermeasures.

]]>
https://www.activecountermeasures.com/blog-wireshark-for-network-threat-hunting-creating-filters/feed/ 1
Version 1.2 Release https://www.activecountermeasures.com/blog-version-1-2-release/ Wed, 15 Aug 2018 08:00:32 +0000 https://www.activecountermeasures.com/?p=1555 We’ve just released version 1.2 of AI-Hunter! There have been a number of tweaks and improvements, but there are three in particular that […]

The post Version 1.2 Release appeared first on Active Countermeasures.

]]>
Threat Hunting – Simplifying The Beacon Analysis Process https://www.activecountermeasures.com/threat-hunting-simplifying-the-beacon-analysis-process/ Mon, 13 Aug 2018 07:00:32 +0000 https://www.activecountermeasures.com/?p=1437 In part one of this two-part series, I described what is involved with performing a beacon analysis and why it is so important […]

The post Threat Hunting – Simplifying The Beacon Analysis Process appeared first on Active Countermeasures.

]]>