Introduction To Endpoint Hunting
Introduction To Endpoint Hunting
Professional
Introduction to Endpoint
Hunting
S e c t i o n 0 3 | M o d u l e 0 1
© Caendra Inc. 2020
All Rights Reserved
Table of Contents
1.1 Introduction
Introduction
Enterprises, for the most part, are doing the best they can
with what they have, with whatever appliances and budget
they have in place.
At the end of the day, you still need to defend the network
and find evil if they’re within your systems.
Windows Processes
*Both LogonUI.exe and Userinit.exe will exist and will not be visible after this process.
Windows 7
*In Windows 10, an instance will start as user upon logon (-k UnistackSvcGroup).
Windows 10
THPv2: Section 03, Module 01 - Caendra Inc. © 2020 | p.41
1.2.9 taskhost.exe
Windows 7
*Windows Internals, Seventh Edition, Part 2 has not been released yet as of this date.
https://www.microsoftpressstore.com/store/windows-internals-part-1-system-architecture-processes-9780735684188
https://www.microsoftpressstore.com/store/windows-internals-part-2-9780735665873
Endpoint Baselines
Alien Vault has a few good postings on their blog about the
subject of File Integrity Monitoring that is worth reading.
You can check:
• Part 1
• Part 2
https://cybersecurity.att.com/blogs/security-essentials/what-is-file-integrity-monitoring
https://cybersecurity.att.com/blogs/security-essentials/what-is-file-integrity-monitoring-and-why-you-need-it
https://www.tripwire.com/products/tripwire-file-integrity-manager/
https://www.solarwinds.com/security-event-manager/use-cases/file-integrity-monitoring-software
https://cybersecurity.att.com/solutions/pci-dss-file-integrity-monitoring
https://www.securetrust.com/solutions/compliance-technologies/file-integrity-monitoring/
https://logrhythm.com/solutions/security/file-integrity-monitoring/
You will need some type of appliance to assist you with this
task, like the ones mentioned in the previous slide.
https://puppet.com/
https://www.ansible.com/
https://www.chef.io/
https://www.red-gate.com/simple-talk/sysadmin/powershell/powershell-desired-state-configuration-the-basics/
These are not the only baselines that you can create with
PowerShell.
Aside from the items already mentioned, here are a few items
that should be baselined (if not controlled by Active Directory):
• Accounts on a system (user or service)
• Local administrators on a system
• Folder permissions
• Folders contents
• Tasks folder (scheduled tasks)
• Network folders containing internal installation
executables & files
THPv2: Section 03, Module 01 - Caendra Inc. © 2020 | p.78
1.3 Endpoint Baselines
https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-classes
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-wmiobject?view=powershell-5.1
THPv2: Section 03, Module 01 - Caendra Inc. © 2020 | p.79
Module Conclusion
Process Injection
https://attack.mitre.org/wiki/Technique/T1055
Process Hollowing
https://attack.mitre.org/wiki/Technique/T1093
SolarWinds
https://www.solarwinds.com/security-event-manager/use-cases/file-integrity-monitoring-
software
SecureTrust
https://www.securetrust.com/solutions/compliance-technologies/file-integrity-monitoring/
SCCM Baselines
https://docs.microsoft.com/en-us/sccm/compliance/deploy-use/create-configuration-
baselines
Puppet
https://puppet.com/
Anisble
https://www.ansible.com/
PowerShell DSC
https://www.red-gate.com/simple-talk/sysadmin/powershell/powershell-desired-state-
configuration-the-basics/
Microsoft SCM
https://www.microsoft.com/en-us/download/details.aspx?id=53353
Microsoft SCM
https://docs.microsoft.com/en-us/archive/blogs/secguide/security-compliance-manager-
scm-retired-new-tools-and-procedures
Get-Service
https://docs.microsoft.com/en-
us/powershell/module/microsoft.powershell.management/get-service?view=powershell-7
Compare-Object
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/compare-
object?view=powershell-7
Win32 Providers
https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-classes
Get-WmiObject
https://docs.microsoft.com/en-
us/powershell/module/microsoft.powershell.management/get-wmiobject?view=powershell-
5.1
THPv2: Section 03, Module 01 - Caendra Inc. © 2020 | p.88