SlideShare a Scribd company logo
Kent Brake
Solutions Architect, Elastic U.S. Federal Team
October 2019
Hunting for Evil with the Elastic
Stack
What is Threat Hunting ?
• Starts with a question / hypothesis
• Requires Searching, Filtering and
Pivoting through large datasets
• Focuses on both outside and inside
threats
Threat Hunting Example - TLS
“Are attackers using TLS to hide their
command-and-control or exfiltrate data?”
Search: Aggregate all TLS connections,
sort by rare organization names, filter for
suspicious names.
Pivot: host data, evaluate processes and users
generating SSL traffic
Search, Filter and Pivot
Search, Filter and Pivot
Search, Filter and Pivot
The Elastic Stack Security Journey
2013
2016
2018
2017
2019
ELK Stack is born
Logstash and Kibana released, forming an
OSS Threat Hunting platform
2011-12
The Elastic Stack Security Journey
2013
2016
2018
2017
2019
ELK Stack is born
Logstash and Kibana released, forming an
OSS Threat Hunting platform
2011-12
Commercial and Federal
Threat hunting early adopters start hunting with
the Elastic Stack.
The Elastic Stack Security Journey
2013
2016
2018
2017
2019
ELK Stack is born
Logstash and Kibana released, forming an
OSS Threat Hunting platform
2011-12
Commercial and Federal
Threat hunting early adopters start hunting with
the Elastic Stack.
Elastic 5.0 - Beats
Elastic Unifies all release cycles of ELK,
renames it “Elastic Stack”, adoption increases
The Elastic Stack Security Journey
2013
2016
2018
2017
2019
ELK Stack is born
Logstash and Kibana released, forming an
OSS Threat Hunting platform
2011-12
Commercial and Federal
Threat hunting early adopters start hunting with
the Elastic Stack.
Elastic 5.0 - Beats
Elastic Unifies all release cycles of ELK,
renames it “Elastic Stack”, adoption increases
Threat Hunting in the Elastic Stack
From Palo Alto Networks to Novetta, hunters
start to standardize on Elastic
The Elastic Stack Security Journey
2013
2016
2018
2017
2019
ELK Stack is born
Logstash and Kibana released, forming an
OSS Threat Hunting platform
2011-12
Commercial and Federal
Threat hunting early adopters start hunting with
the Elastic Stack.
Elastic 5.0 - Beats
Elastic Unifies all release cycles of ELK,
renames it “Elastic Stack”, adoption increases
Threat Hunting in the Elastic Stack
From Palo Alto Networks to Novetta, hunters
start to standardize on Elastic
Mitre Att&ck - RockNSM - HELK
Threat hunting embraces Att&ck, RockNSM and
HELK projects go mainstream
The Elastic Stack Security Journey
2013
2016
2018
2017
2019
ELK Stack is born
Logstash and Kibana released, forming an
OSS Threat Hunting platform
2011-12
Commercial and Federal
Threat hunting early adopters start hunting with
the Elastic Stack.
Elastic 5.0 - Beats
Elastic Unifies all release cycles of ELK,
renames it “Elastic Stack”, adoption increases
Threat Hunting in the Elastic Stack
From Palo Alto Networks to Novetta, hunters
start to standardize on Elastic
Mitre Att&ck - RockNSM - HELK
Threat hunting embraces Att&ck, RockNSM and
HELK projects go mainstream
Elastic 7.0
ML for Threat Hunting matures, entity analysis
and ECS make hunting easier
Threat Hunting Complexity
Threat hunting questions are getting harder to ask
Evolving Architectures ~↑ Hunting Complexity
● Core Infrastructure is in a state
of change
● K8s and Docker create new
optimizations but also new
challenges
● Attack surface increases with
new API’s and multi-tenant
compute
● Ephemeral compute, automatic
scaling and reallocation, third-
party infrastructure packages
Threat Hunting Example - Today - Machine Learning
“Are attackers abusing built-in system
tools to hide malicious actions?”
Search: Use ML to power Search for
rare commands being ran from a shell
Pivot: sort by time-of-day, admin user, network activity
Search, Filter and Pivot
SANS
"After seeing Elasticsearch continue to pop up in SANS courses
across the curriculum, I have noticed students are consistently
curious and excited by the search features the open-source
Elastic Stack provides.
Numerous security tools, projects, and even commercial SIEMs
have moved to using the lightning-fast distributed search tool as
the cornerstone of their functionality.”
https://www.sans.org/course/siem-design-and-implementation/course/desc/summit
Come to the AMA booth!
Questions?

More Related Content

PDF
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
PDF
Threat Hunting with Splunk Hands-on
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PPTX
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
PDF
Hunting for Privilege Escalation in Windows Environment
PDF
Hunting for Credentials Dumping in Windows Environment
PDF
Windows Threat Hunting
PPTX
Detection Rules Coverage
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Threat Hunting with Splunk Hands-on
PHDays 2018 Threat Hunting Hands-On Lab
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
Hunting for Privilege Escalation in Windows Environment
Hunting for Credentials Dumping in Windows Environment
Windows Threat Hunting
Detection Rules Coverage

What's hot (20)

PDF
Juraci Paixão Kröhling - All you need to know about OpenTelemetry
PDF
ATT&CKING Containers in The Cloud
PDF
Hunting Lateral Movement in Windows Infrastructure
PDF
The ATT&CK Philharmonic
PDF
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
PDF
Intro to open source observability with grafana, prometheus, loki, and tempo(...
PDF
Introduction to eBPF
PDF
How MITRE ATT&CK helps security operations
PDF
How to Hunt for Lateral Movement on Your Network
PDF
ATT&CKing the Red/Blue Divide
PPTX
DevSecOps reference architectures 2018
PPTX
Bridging the Gap
PPTX
Purple Teaming with ATT&CK - x33fcon 2018
PDF
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
PDF
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
PDF
Grafana Loki: like Prometheus, but for Logs
PPTX
Threat Hunting with Splunk
PPTX
Leveraging Nexus Repository Manager at the Heart of DevOps
PDF
Practical DevSecOps Course - Part 1
PDF
Security Process in DevSecOps
Juraci Paixão Kröhling - All you need to know about OpenTelemetry
ATT&CKING Containers in The Cloud
Hunting Lateral Movement in Windows Infrastructure
The ATT&CK Philharmonic
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
Intro to open source observability with grafana, prometheus, loki, and tempo(...
Introduction to eBPF
How MITRE ATT&CK helps security operations
How to Hunt for Lateral Movement on Your Network
ATT&CKing the Red/Blue Divide
DevSecOps reference architectures 2018
Bridging the Gap
Purple Teaming with ATT&CK - x33fcon 2018
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Grafana Loki: like Prometheus, but for Logs
Threat Hunting with Splunk
Leveraging Nexus Repository Manager at the Heart of DevOps
Practical DevSecOps Course - Part 1
Security Process in DevSecOps
Ad

Similar to Hunting for Evil with the Elastic Stack (20)

PDF
Elastic SIEM (Endpoint Security)
PDF
CircleCityCon - Threat Hunting with the Elastic Stack
PPTX
Elasticsearch features and ecosystem
PPTX
c0c0n Elastic Security Workshop - 7.7 [Elastic SIEM].pptx
PPTX
ELK Solutions Enablement Session - 17th March'2020
PDF
What's new at Elastic: Update on major initiatives and releases
PDF
Elastic Security keynote
PPTX
The Elastic ELK Stack
PDF
Palestra de abertura: Evolução e visão do Elastic Security
PDF
Alamo ACE - Threat Hunting with CVAH
PDF
Examining OpenData with a Search Index using Elasticsearch
PDF
What's new at Elastic: Update on major initiatives and releases
PPTX
ELK Stack Online Training - ELK Stack Training.pptx
PPTX
Elastic Meetup Belgium - December 2018
PDF
Elastic Stack keynote
PDF
Elastic Security : Protéger son entreprise avec la Suite Elastic
PDF
Logs aggregation and analysis
PDF
BSides JAX 2019 - Threat Hunting with the Elastic Stack
PDF
Keynote: Elastic Security evolution and vision
PDF
Elastic Security under the hood
Elastic SIEM (Endpoint Security)
CircleCityCon - Threat Hunting with the Elastic Stack
Elasticsearch features and ecosystem
c0c0n Elastic Security Workshop - 7.7 [Elastic SIEM].pptx
ELK Solutions Enablement Session - 17th March'2020
What's new at Elastic: Update on major initiatives and releases
Elastic Security keynote
The Elastic ELK Stack
Palestra de abertura: Evolução e visão do Elastic Security
Alamo ACE - Threat Hunting with CVAH
Examining OpenData with a Search Index using Elasticsearch
What's new at Elastic: Update on major initiatives and releases
ELK Stack Online Training - ELK Stack Training.pptx
Elastic Meetup Belgium - December 2018
Elastic Stack keynote
Elastic Security : Protéger son entreprise avec la Suite Elastic
Logs aggregation and analysis
BSides JAX 2019 - Threat Hunting with the Elastic Stack
Keynote: Elastic Security evolution and vision
Elastic Security under the hood
Ad

More from Elasticsearch (20)

PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
From MSP to MSSP using Elastic
PDF
Cómo crear excelentes experiencias de búsqueda en sitios web
PDF
Te damos la bienvenida a una nueva forma de realizar búsquedas
PDF
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Plongez au cœur de la recherche dans tous ses états.
PDF
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
Welcome to a new state of find
PDF
Building great website search experiences
PDF
Keynote: Harnessing the power of Elasticsearch for simplified search
PDF
Cómo transformar los datos en análisis con los que tomar decisiones
PDF
Explore relève les défis Big Data avec Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Transforming data into actionable insights
PDF
Opening Keynote: Why Elastic?
PDF
Empowering agencies using Elastic as a Service inside Government
PDF
The opportunities and challenges of data for public good
PDF
Enterprise search and unstructured data with CGI and Elastic
An introduction to Elasticsearch's advanced relevance ranking toolbox
From MSP to MSSP using Elastic
Cómo crear excelentes experiencias de búsqueda en sitios web
Te damos la bienvenida a una nueva forma de realizar búsquedas
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Comment transformer vos données en informations exploitables
Plongez au cœur de la recherche dans tous ses états.
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
An introduction to Elasticsearch's advanced relevance ranking toolbox
Welcome to a new state of find
Building great website search experiences
Keynote: Harnessing the power of Elasticsearch for simplified search
Cómo transformar los datos en análisis con los que tomar decisiones
Explore relève les défis Big Data avec Elastic Cloud
Comment transformer vos données en informations exploitables
Transforming data into actionable insights
Opening Keynote: Why Elastic?
Empowering agencies using Elastic as a Service inside Government
The opportunities and challenges of data for public good
Enterprise search and unstructured data with CGI and Elastic

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Cloud computing and distributed systems.
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
sap open course for s4hana steps from ECC to s4
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25 Week I

Hunting for Evil with the Elastic Stack

  • 1. Kent Brake Solutions Architect, Elastic U.S. Federal Team October 2019 Hunting for Evil with the Elastic Stack
  • 2. What is Threat Hunting ? • Starts with a question / hypothesis • Requires Searching, Filtering and Pivoting through large datasets • Focuses on both outside and inside threats
  • 3. Threat Hunting Example - TLS “Are attackers using TLS to hide their command-and-control or exfiltrate data?” Search: Aggregate all TLS connections, sort by rare organization names, filter for suspicious names. Pivot: host data, evaluate processes and users generating SSL traffic
  • 7. The Elastic Stack Security Journey 2013 2016 2018 2017 2019 ELK Stack is born Logstash and Kibana released, forming an OSS Threat Hunting platform 2011-12
  • 8. The Elastic Stack Security Journey 2013 2016 2018 2017 2019 ELK Stack is born Logstash and Kibana released, forming an OSS Threat Hunting platform 2011-12 Commercial and Federal Threat hunting early adopters start hunting with the Elastic Stack.
  • 9. The Elastic Stack Security Journey 2013 2016 2018 2017 2019 ELK Stack is born Logstash and Kibana released, forming an OSS Threat Hunting platform 2011-12 Commercial and Federal Threat hunting early adopters start hunting with the Elastic Stack. Elastic 5.0 - Beats Elastic Unifies all release cycles of ELK, renames it “Elastic Stack”, adoption increases
  • 10. The Elastic Stack Security Journey 2013 2016 2018 2017 2019 ELK Stack is born Logstash and Kibana released, forming an OSS Threat Hunting platform 2011-12 Commercial and Federal Threat hunting early adopters start hunting with the Elastic Stack. Elastic 5.0 - Beats Elastic Unifies all release cycles of ELK, renames it “Elastic Stack”, adoption increases Threat Hunting in the Elastic Stack From Palo Alto Networks to Novetta, hunters start to standardize on Elastic
  • 11. The Elastic Stack Security Journey 2013 2016 2018 2017 2019 ELK Stack is born Logstash and Kibana released, forming an OSS Threat Hunting platform 2011-12 Commercial and Federal Threat hunting early adopters start hunting with the Elastic Stack. Elastic 5.0 - Beats Elastic Unifies all release cycles of ELK, renames it “Elastic Stack”, adoption increases Threat Hunting in the Elastic Stack From Palo Alto Networks to Novetta, hunters start to standardize on Elastic Mitre Att&ck - RockNSM - HELK Threat hunting embraces Att&ck, RockNSM and HELK projects go mainstream
  • 12. The Elastic Stack Security Journey 2013 2016 2018 2017 2019 ELK Stack is born Logstash and Kibana released, forming an OSS Threat Hunting platform 2011-12 Commercial and Federal Threat hunting early adopters start hunting with the Elastic Stack. Elastic 5.0 - Beats Elastic Unifies all release cycles of ELK, renames it “Elastic Stack”, adoption increases Threat Hunting in the Elastic Stack From Palo Alto Networks to Novetta, hunters start to standardize on Elastic Mitre Att&ck - RockNSM - HELK Threat hunting embraces Att&ck, RockNSM and HELK projects go mainstream Elastic 7.0 ML for Threat Hunting matures, entity analysis and ECS make hunting easier
  • 13. Threat Hunting Complexity Threat hunting questions are getting harder to ask Evolving Architectures ~↑ Hunting Complexity ● Core Infrastructure is in a state of change ● K8s and Docker create new optimizations but also new challenges ● Attack surface increases with new API’s and multi-tenant compute ● Ephemeral compute, automatic scaling and reallocation, third- party infrastructure packages
  • 14. Threat Hunting Example - Today - Machine Learning “Are attackers abusing built-in system tools to hide malicious actions?” Search: Use ML to power Search for rare commands being ran from a shell Pivot: sort by time-of-day, admin user, network activity
  • 16. SANS "After seeing Elasticsearch continue to pop up in SANS courses across the curriculum, I have noticed students are consistently curious and excited by the search features the open-source Elastic Stack provides. Numerous security tools, projects, and even commercial SIEMs have moved to using the lightning-fast distributed search tool as the cornerstone of their functionality.” https://www.sans.org/course/siem-design-and-implementation/course/desc/summit
  • 17. Come to the AMA booth! Questions?