Hey Buddy, Can You Spare a Log? Adventures in Log-Based Threat Hunting
Introduction A long time ago, in a blog far, far away (August 1, 2016: Slinging Hash: Speeding Cyber Threat Hunting Methodologies via Hash-Based Searching) I presented how I used hash algorithms to speed up searching large DNS log files. The…
Continue reading Hey Buddy, Can You Spare a Log? Adventures in Log-Based Threat Hunting