Threat Hunters, Hard job, tough to find too! – the following article has been kindly shared with permission by GravityWall.net from an original article written on their website here.
Employing good cyber security candidates is hard
So many considerations: technical vs team fit vs ability to learn etc etc, I recently came across this very well written article on employing Threat Hunters, where the author is clearly articulating how they look for the right candidates. With the current difficulties in recruiting cyber security people I hope the following helps others.
My Favorite Interview Question for Threat Hunters
Several years ago, I was responsible for interviewing applicants applying for a threat hunting position. I was one of a few managers who would interview the applicants separately and make recommendations. Some of the interviewers focused on knowledge; where is the SHIM cache located, what file stores user passwords in a Windows environment that isnโt domain joined, what are shellbags, etc. Others focused on the individualโs personality; what do they want to do, how do they work with teams, greatest mistake, etc.
I however focused on the applicantโs mindset. Did this individual think like a threat hunter. See itโs easy to teach people knowledge. I can teach an individual what the SAM file is, or which keys in the Registry Hive are typically used to establish malware persistence; but itโs difficult to teach someone how to think like a threat hunter. This is why I would only ask one single question during my interviews. I was confident that this one question was enough to tell me if someone was capable of thinking like a threat hunter (or at least learning to think like one).
Since Iโm not a hiring manager anymore, and Iโm not disclosing the name of the company, I can now share this question and explain why I thought it was so useful.
When I was interviewing people, I would provide them with this network map and ask them to explain their threat hunting plan to hunt for an unknown adversary in the network. I would provide some additional caveats; specifically, I would inform them that they would be working with Security Onion and only had 2 Sensors to place in the network.
I picked Security Onion because of its opensource vendor agnostic nature, and because Security Onion is a legitimate tool Iโve used in Hunts. However, I would let applicants know that this wasnโt a quiz on their knowledge of Security Onion and if they werenโt familiar with some of the capabilities of the tool thatโs fine, I can explain them.
Whatโs the right answer?
Thatโs the beauty of this question; there isnโt a right answer. There are a lot of right answers and a lot of wrong answers, but there is no one right answer. So, instead of trying to explain the right answer Iโll address some of the approaches towards answering this question.
The Key Terrain Approach
This is perhaps the best approach to take when preparing to hunt on a new network you know nothing about. Iโm going to link this back to my days in the military. In the military we have a doctrine that discusses a topic known as Key Terrain. In the Army doctrine Key Terrain is any terrain that gives a combatant an advantage. Key Terrain Cyberspace (KT-C) is a relatively new and developing concept but itโs an important idea to understand.
When you donโt know anything about the network where should you start looking? Well, you need to know what parts of the network are important to the operations of the business. This is called the Key Terrain, and thatโs where you should start hunting.
Take a look at our network here. Itโs a warehouse, so its primary functions are to import items, store them, and then ship them out on request. This is the primary mission of the Warehouse (to go with Military terms again). In order to do this mission, the warehouse needs some things. The wireless network which powers the handheld scanners and the SQL server which records all the moving items are both examples of things required for the warehouse to function.
Understanding this key terrain would the suggest that we place one of our sensors at a location where we can collect information from the SQL server.
I donโt provide any of this information upfront because I want to see how an applicant thinks. Do they begin by trying to understand the key terrain and mission requirements of the business theyโre hunting? Or do they immediately start deploying sensors?
These interviews were back and forth conversations, so if an applicant spent our entire interview just asking questions about the key terrain, then I would consider that a win and would invite them back from the next phase of interviews.
The Adversary COA Approach
Another approach that I liked to see was the adversary centric, or adversary course of action (COA), approach. In this approach the applicant would create an adversaryโs likely course of action and then proceed to deploy sensors in a location where they would be able to detect the COA they came up with.
This approach does not consider KT-C but thatโs not always a bad thing. Think again about our warehouse example. How likely is it that the adversary is going to get malware on a handheld scanner? Itโs relatively unlikely, so while the handheld scanners may be KT-C they may not necessarily be relevant to the hunt. This is referred to as Mission Relevant Terrain Cyberspace (MRT-C). What equipment in your network is relevant to the mission? Do you spend time trying to figure out how to monitor a handheld scanner or do you focus on things more relevant to what an adversary can actually do?
Look back at our network map. Do you see the break room subnet? These computers are connected to a commercial internet rather than the companyโs private intranet; however, the router is configured wrong allowing the break room subnet to talk to the rest of the companyโs intranet (something Iโd tell the applicant if they asked how the router is configured).
With an Adversary Centric Approach, the applicant might identify that the break room computers (with open access to the internet) are a soft spot an adversary might gain initial access to. That applicant might theorize that a warehouse employee would click on a phishing email while on break and download malware to the break room computer. The applicant might then theorize that an attacker would use exploitation for lateral movement and hit some of the companies more vulnerable systems using high success exploits like EternalBlue.
Using this hypothesis, the applicant would then place their sensors in a location where they could detect the lateral movement between the break room subnet and another system like the SQL server.
I would also consider this approach perfectly valid, and an applicant who took this approach would be asked to come in for follow on interviews with the rest of the team.
The Capabilities Based Approach
With this approach an applicant would first seek to understand what tools they have access to and what capabilities those tools possess. They would also seek to understand what intrinsic capabilities already exist inside of the environment and to what extend those capabilities are being used.
Look at our map; the main router is a pfSense. A pfSense router has a number of different capabilities include Snort and Suricata IDS/IPS, Zeek IDS, and pfBlockerNG-devel. Are these tools installed? If so, are they configured, and how are they configured? What about the switches? Theyโre Ubiquiti Enterprise switches, which means theyโre managed switches. Are the switches configured to SPAN port traffic to some sort of collector?
An applicant using this approach would look to place their sensors in a location where there are gaps in coverage. Theyโd seek to leverage the capabilities already existing in the environment and then add sensors where the capabilities donโt exist or arenโt sufficient.
This approach would also net the applicant a follow-on interview.
The Data Driven Approach
The last approach I want to talk about is the data driven approach. You may have noticed that I didnโt provide a lot of information about the network. I intentionally gave very little information because thatโs an unfortunate reality of some of the situations Iโve found myself in. Iโve been told my team is going to be hunting on a network in a week and we were handed a map with no information with which to plan our hunt.
What were the ACLs on the Router? How are the VLANs set up? Whatโs the security on the Wireless? Do the end points have a host base security suite on them? What is their patch level? What about EDRs? What OSes and what versions are in the environment? How long is log storage? Do the systems have a DLP policy which blocks USB? What software is running on the systems? What is its patch date of that software? And more.
All of these questions are important and can drastically change how a hunt team prepares and deploys in a network. If I know that the endpoints have a DLP tool which blocks USBs then maybe I donโt need to focus my efforts on hunting for artifacts of a USB malware.
An applicant who starts digging into the network this way would likely be a good hunter as they can start eliminating things the hunt team needs to worry about.
Why these approaches?
I focused on these approaches specifically for two reasons. First because I want a Hunter to do all four of these approaches simultaneously, constantly, and with ever hunt operations they go to. I used to train my analysts to go through these approaches when training.
The second reason is because itโs more important to have a solid framework than a laundry list of facts. Anyone who has done threat hunting knows that you canโt just โfind badโ. Sure, maybe if you have a single computer, youโre investigating then pulling all the event logs and scrolling though until you find bad works. Itโs not efficient but it can work (lord knows I did that when I started). However, a network of even as few as 5 computers will render this approach completely broken.
Iโll say that again. Simply deploying sensors, pulling back data, and hoping to find bad does not work. This question also gives me the benefits of being able to dig deeper to really understand the applicants through process.
Digging Deeper
With each of these approaches I can dig deeper to see how theyโre thinking. Letโs say that the applicant wants to deploy one of their two sensors at the switch between the HR subnet and the main network. I would follow up this question by asking โHow do you plan to deploy that sensor?โ If the applicant says theyโre planning to deploy the sensor in-line, then I would ask them โwhat considerations do you need to make when deploying in-line?โ
The consideration Iโm looking for here is the applicant to recognize that deploying in-line means bringing a portion of the network offline for a short time while they deploy sensors. Iโve found that a lot of network owners arenโt thrilled with the idea of you bringing down a portion of their network for even a few minutes to deploy equipment.
If and when an applicant realizes this theyโll have to come up with an alterative way to get the same information. Commonly that would be SPAN porting the switch. If the applicant says that then Iโll ask what considerations do they need to make with a SPAN port, expecting answers like how the total bandwidth of the network might be greater than the speed of a single SPAN port potentially resulting in dropped packets.
These questions can go deeper and deeper until we run out of time or the applicant canโt answer anymore. These deep dive questions arenโt strictly speaking necessary but they give a good understanding of how strategic the applicant thinks. Someone who is able to navigate through these considerations will probably be a good hunter; however, a lot of these considerations are things that come with experience so someone who canโt answer isnโt necessarily a poor choice.
What doesnโt work?
Iโm going to quickly list out a few things Iโve seen that donโt work.
- Complaining
- This should be obvious but complaining about how unfair the question is wonโt get you a follow-on interview
- Saying thereโs not enough information
- As I mentioned above, there have been plenty of times Iโve been given almost no data to work with. A good hunter needs to learn to ask questions and pull in additional information.
- Listing facts of what youโre going to pull and from where
- This is by far the most common response I would get from people who werenโt familiar with hunting but took an Incident Response course. Theyโll start telling me how theyโre going to check the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Runkey to look for a persistence mechanism or theyโll pull the C:\Windows\System32\Config SAM file.
- These factoids are great, but when I dig a bit deeper usually the knowledge fails. Why are you checking the RUN key? What are you looking for? How did an adversary put malware there? What are you looking for in the SAM file?
Issues
I recognize that this method might have some issues. Its possible that an applicant could have extremely technical knowledge but not a good vision for hunting. I consider this situation less important because teaching someone how to think is more difficult then teaching them factoids about systems.
Iโve also had the opposite happen where I approved someone who was good at thinking about hunt, but didnโt understand how to actually do anything they came up with. Generally we can teach people this but occasionally weโve hired someone who simply didnโt want to learn.
Conclusion
This was my favorite question to ask applicants when hiring for a hunt team. The open ended nature of the question closely resembled real world scenarios Iโve dealt with. Asking a question like this helps me understand if the person Iโm interviewing can think like a hunter or not.
What do you think of this question, and how would you answer it?
This article was kindly shared with permission from Gravitywall.net.
As always if you want assistance with cyber security related topics or have suggestions for us then please contact us here.
Leave a Reply