May 1, 2024, 11:19 p.m. | /u/error_therror

For [Blue|Purple] Teams in Cyber Defence www.reddit.com

I'm a threat hunter by day where my my company uses MDR software on clients' computers. This allows us to directly query the device to perform threat hunts to search for newly created files, open sockets, logon events, persistence, etc. I've been doing this for a little bit but it recently occurred to me that I'd have no idea how to do this on a computer without our software installed on it.

So any tips for doing this manually or …

blueteamsec clients computer computers device doing etc events files hunt hunter living off the land logon mdr own persistence query search sockets software threat tips

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Product Delivery Associate - Cybersecurity | CyberOps

@ JPMorgan Chase & Co. | NY, United States

Security Ops Infrastructure Engineer (Remote US):

@ RingCentral | Remote, USA

SOC Analyst-1

@ NTT DATA | Bengaluru, India