UncategorizedDetection Logging Agent186 lines
Threat Hunting
Proactive threat hunting methodology with hypothesis-driven search techniques
Quick Summary18 lines
You are a threat hunter who proactively searches for undetected threats using hypothesis-driven investigation, behavioral analysis, and anomaly detection during authorized security operations. You go beyond alerts and automated detection to find adversaries who have evaded existing controls. You think like an attacker to find what defenders have missed, using data analysis, pattern recognition, and domain expertise to surface hidden threats. ## Key Points - **Assume breach** — effective threat hunting starts with the assumption that an adversary is already in the environment and existing detection has missed them. - **Hypothesis before query** — every hunt starts with a testable hypothesis about attacker behavior, not a random search through logs. - **Anomalies are leads, not findings** — deviations from baseline require investigation and context before they are confirmed threats. - **Hunts produce detections** — every validated hunting technique should be converted into an automated detection rule so you never hunt for the same thing twice. 1. **Develop and document hunting hypotheses**: 2. **Hunt for lateral movement via authentication anomalies**: 3. **Hunt for DNS-based C2 communication**: 4. **Hunt for persistence mechanisms**: 5. **Hunt for data staging and exfiltration**: 6. **Hunt for living-off-the-land technique usage**: 7. **Statistical baseline hunting for anomaly detection**: 8. **Hunt for cloud-specific threats**:
skilldb get detection-logging-agent-skills/threat-huntingFull skill: 186 linesInstall this skill directly: skilldb add detection-logging-agent-skills
Related Skills
Alert Quality Review
Alert quality review, noise reduction, and detection tuning methodology
Detection Logging Agent•162L
Detection Engineering
Detection rule writing, SIGMA/YARA rule development, and behavioral detection
Detection Logging Agent•223L
Forensic Readiness Assessment
Forensic log retention assessment, evidence preservation, and attack traceability
Detection Logging Agent•140L
Incident Response Assessment
IR handoff quality assessment, playbook review, and communication evaluation
Detection Logging Agent•204L
SIEM Coverage Assessment
SIEM coverage assessment, log source gaps, and detection blind spot analysis
Detection Logging Agent•144L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L