Slinging Hash: Speeding Cyber Threat Hunting Methodologies via Hash-Based Searching

Introduction The term “hash” is thrown around in casual IT conversation quite a bit nowadays, from “pass the hash” to “salted hashes” to “would you like hot sauce with your hash?” Certainly there are many useful things that one can…