Threat Hunting
Yara
Cheatsheet
source: https://blog.securitybreak.io/security-infographics-9c4d3bd891ef#18dd
Windows
Just use sysinternals...
Linux
View Processes:
List running Services:
Check your logs: Can be useful to check for "nc" or other attacker tools:
Active TCP and UDP connections:
Crontab
Check your crontab:
Clear your crontab:
Log Analysis
Last updated