Large-Scale Compromise Detection Playbook
Introduction: The Need for Effective Large-Scale Compromise Detection Capabilities
Table of Contents
1. Initial Detection and Scoping
Query Option 1: Identify Compromised Hosts
Query Option 2: Detect Unusual Authentication Activity
Query Option 3: Advanced Network Traffic Analysis
2. Threat Persistence Mechanisms
Query Option 1: Registry Key Persistence
Query Option 2: Scheduled Task Creation
Query Option 3: Startup Folder Monitoring
3. Privilege Escalation Indicators
Query Option 1: Detect Abnormal Process Behavior
Query Option 2: Credential Dumping Activities
Query Option 3: Privilege Escalation via Exploits
4. Lateral Movement
Query Option 1: Remote Desktop Protocol (RDP) Activity
Query Option 2: Lateral Movement via SMB Shares
Query Option 3: SSH Lateral Movement
5. Data Exfiltration Detection
Query Option 1: Monitor Large Data Transfers
Query Option 2: Anomalous Cloud Storage Access
Query Option 3: DNS Tunneling Detection
6. Incident Response and Containment
Query Option 1: Isolate Compromised Systems
Query Option 2: Identify Indicators of Compromise (IoCs)
Query Option 3: Timeline Reconstruction
7. Conclusion
Last updated