© Morey J. Haber and Brad Hibbert 2018
Morey J. Haber and Brad HibbertPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-3048-0_7

7. Threat Hunting

Morey J. Haber and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 
As a child, or even as an adult, have you ever played the game, “Where’s Waldo?” If you have, you may already understand how this section relates to Threat Hunting. For those who have not heard of the game, the object is to find a picture of Waldo in a picture filled with other graphics and people. Spotting Waldo is difficult and identifying him from the crowd is downright frustrating in some of the illustrations. It is a game of patience, visual acuity, and methodical review of graphics. To that end, a modern ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.