Slinging Hash: Speeding Cyber Threat Hunting Methodologies via Hash-Based Searching

Introduction The term “hash” is thrown around in casual IT conversation quite a bit nowadays, from “pass the hash” to “salted hashes” to “would you like hot sauce with your hash?” Certainly there are many useful things that one can…
Continue reading Slinging Hash: Speeding Cyber Threat Hunting Methodologies via Hash-Based Searching

Posted in Uncategorized

Slinging Hash: Speeding Cyber Threat Hunting Methodologies via Hash-Based Searching

Introduction The term “hash” is thrown around in casual IT conversation quite a bit nowadays, from “pass the hash” to “salted hashes” to “would you like hot sauce with your hash?” Certainly there are many useful things that one can…
Continue reading Slinging Hash: Speeding Cyber Threat Hunting Methodologies via Hash-Based Searching

Posted in Uncategorized

Slinging Hash: Speeding Cyber Threat Hunting Methodologies via Hash-Based Searching

Introduction The term “hash” is thrown around in casual IT conversation quite a bit nowadays, from “pass the hash” to “salted hashes” to “would you like hot sauce with your hash?” Certainly there are many useful things that one can…
Continue reading Slinging Hash: Speeding Cyber Threat Hunting Methodologies via Hash-Based Searching

Posted in Uncategorized