Posted on

osquery for Beginners: Asking Questions of Your Systems

Hello, aspiring ethical hackers. In our previous blogposts, you learnt about Threat Hunting, Digital Forensics and Incident Response. In this article, you will learn about a tool that plays an important role in all the above. When beginners start learning cybersecurity, system visibility often feels overwhelming. Logs are scattered, endpoints behave differently and it’s hard to answer simple questions like “What processes are running right now?” or “Which machines have this software installed?” This is exactly the problem osquery was designed to solve.

osquery allows security teams and system administrators to query operating systems the same way they query a database. For beginners, it offers a simple and powerful way to understand what is happening on systems, without needing complex scripts or intrusive tools.

What Is osquery?

osquery is an open-source endpoint instrumentation framework that exposes operating system data as SQL-like tables. Instead of writing custom scripts, users can ask structured questions such as:

  • What processes are running?
  • Which users exist on this system?
  • What network connections are active?
  • Which startup items are configured?

osquery was originally developed at Facebook (now Meta) and is widely used by security teams, SOCs and system administrators for visibility, monitoring and threat detection. In simple terms, osquery turns your operating system into a queryable data source.

How osquery works?

osquery collects information from the operating system and organizes it into tables, similar to a relational database. Examples include:

  • processes – running processes
  • users – local user accounts
  • listening_ports – services listening on the network
  • startup_items – programs that run at boot

You use SQL-style queries to retrieve information from these tables. For example, you might query which processes are running or which users have logged in recently. Importantly, osquery does not exploit systems or inject code. It simply observes and reports the state of the system.

Typical Workflow with osquery

A simple osquery learning workflow looks like this.

  1. Decide what question you want answer to
  2. Identify the relevant osquery table
  3. Run a basic query
  4. Review and interpret results
  5. Refine the query if needed
  6. Document findings

This mirrors how professional threat hunters work, iteratively and methodically.

osquery in Security Operations

osquery is commonly used in cybersecurity for:

  • Threat hunting: Searching for suspicious processes or configurations
  • Incident response: Quickly gathering system information
  • Compliance monitoring: Checking security settings across systems
  • Asset visibility: Understanding what software and services exist

For beginners, this shows how security teams move from guesswork to evidence-based investigations.

Common Use Cases

Some beginner-friendly osquery use cases include:

  • Listing all running processes
  • Finding unusual network connections
  • Checking which users have administrator privileges
  • Identifying startup programs
  • Verifying security configurations

These tasks help beginners understand both normal behavior and anomalies.

osquery vs Traditional Logging

It helps to understand the difference between working of osquery and traditional logs.

Traditional Logs:

  • Record events after they happen
  • Often noisy and inconsistent
  • Hard to ask follow-up questions

osquery:

  • Provides current system state
  • Structured and queryable
  • Easy to pivot and refine questions

osquery doesn’t replace logs. It complements them by answering questions logs cannot.

Why osquery Is Valuable for Beginners?

Beginners often struggle with where to look during investigations. osquery simplifies this by offering:

  • A consistent way to inspect systems
  • A familiar SQL-style query language
  • Read-only access by default (safer learning)
  • Cross-platform support (Windows, Linux, macOS)

Instead of memorizing commands for each operating system, beginners can focus on just asking the right questions. osquery is widely used in:

  • SOC environments
  • Threat hunting teams
  • Incident response operations
  • Endpoint monitoring platforms

Learning osquery builds foundational skills in:

  • Endpoint visibility
  • Analytical thinking
  • Query-based investigations
  • Defensive security mindset

These skills are transferable to many other security tools.

Challenges Beginners May Face

Like any tool, osquery has a learning curve. Beginners may encounter:

  • SQL syntax mistakes
  • Large amounts of returned data
  • Difficulty interpreting results
  • Uncertainty about what “normal” looks like

These challenges improve with practice. The key is learning to ask smaller but focused questions.

Best Practices for Beginners

If you’re new to osquery,

  • Use it in labs or test environments
  • Start with read-only queries
  • Focus on understanding results, not speed
  • Document what each query tells you
  • Combine osquery data with logs and alerts

osquery is most powerful when used thoughtfully.

Conclusion

osquery teaches a critical cybersecurity lesson: good security starts with good questions. Instead of guessing what might be wrong, you ask the system directly and get structured answers. For beginners, osquery is an excellent gateway into endpoint visibility, threat hunting and modern blue-team workflows. By learning how to query systems safely and intelligently, you build skills that remain valuable across nearly every area of cybersecurity.

Posted on

MISP for Beginners: Sharing Threat Intelligence the Right Way

Hello, aspiring ethical hackers. In our previous blogpost, you learnt in detail about Threat Intelligence. In this article, you will learn about Malware Information Sharing Platform (MISP), which plays an important role in Threat Intelligence. When beginners start learning cybersecurity, most of the focus is on tools that detect or analyze threats. These tools may be SIEMs, scanners or forensic utilities. However, modern security teams also rely heavily on threat intelligence which gives information about attackers, threat indicators and campaigns that helps them prepare before an incident happens.

This is where MISP comes in. It helps organizations collect, organize, share and use threat intelligence in a structured and collaborative way. For beginners, it provides a practical introduction to how intelligence-driven security actually works.

What Is MISP?

MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform designed to store, share and correlate indicators of compromise (IOCs) and related contextual information. It is developed and maintained by the MISP Project and is widely used by:

  • Security operations centers (SOCs)
  • Incident response teams
  • CERTs and CSIRTs
  • Threat intelligence teams

In simple terms, MISP answers this question:
“What do we know about threats, and how can we share that knowledge safely?”

Core Concepts of MISP

If you understand a few key concepts, it will make MISP much easier to grasp. These concepts help beginners understand how intelligence is structured, not just collected.

1. Events:

An event represents a security incident, campaign or investigation. It acts as a container for related information.

2. Attributes:

Attributes are individual pieces of intelligence, such as:

  • IP addresses
  • Domains
  • File hashes
  • URLs
  • Email addresses

Each attribute includes context, such as type, category and confidence.

3. Objects:

Objects group related attributes together. For example, a “file” object may include a filename, hash and size.

4. Tags:

Tags help classify events and attributes into:

  • Malware families
  • Threat actor names
  • Confidence levels
  • Traffic light protocol (TLP) markings

MISP in a SOC Workflow

A simplified SOC workflow involving MISP looks like this:

  1. An incident or suspicious activity is detected
  2. Indicators are identified during investigation
  3. Indicators are added to MISP as an event
  4. Other teams or organizations can reuse that intelligence
  5. Detection systems are updated using shared indicators

This workflow highlights an important lesson: intelligence becomes more valuable when it is shared responsibly.

MISP vs Other Security Tools

Beginners sometimes confuse MISP with SIEMs or detection platforms. But this is wrong. Here are the key differencces.

  • SIEMs focus on log collection and correlation
  • IDS/IPS tools detect suspicious network activity
  • EDR tools focus on endpoint behavior
  • Whereas MISP focuses on organizing and sharing threat intelligence

MISP does not replace these tools. It enhances them by providing context and collective knowledge.

Common Use Cases of MISP

MISP is not a detection tool by itself. Instead, it supports many security workflows including:

  • Threat intelligence sharing between trusted organizations
  • Enriching alerts from SIEMs or IDS systems
  • Incident response investigations, adding context to indicators
  • Threat hunting, using known IOCs to search environments
  • Research and analysis, tracking campaigns over time

For beginners, this shows how intelligence feeds into real operational security. Common Use Cases of this are,

  • Storing IOCs from lab investigations
  • Tracking phishing indicators
  • Sharing indicators between blue-team exercises
  • Learning how threat campaigns evolve
  • Understanding confidence and data quality in intelligence

Challenges Beginners May Face

MISP introduces new concepts that can be challenging to beginners at first. These concepts are,

  • Understanding data quality and false positives
  • Learning when not to share sensitive information
  • Managing large numbers of indicators
  • Interpreting confidence and context correctly

These challenges are normal. Beginners should focus on quality over quantity.

Why Learning MISP is valuable?

MISP is widely used in:

  • SOC and blue-team environments
  • Threat intelligence sharing communities
  • CERT and national cyber defense teams
  • Research and analysis roles

For beginners, learning learning about this builds skills in:

  • Threat intelligence fundamentals
  • Collaboration and information sharing
  • Context-driven security decisions
  • Strategic thinking beyond alerts

Conclusion

Beginners often see security as a purely technical activity that involves running tools and responding to alerts. MISP introduces a broader perspective by showing that information sharing and context are just as important. Mastering Learning it helps beginners understand:

  • What threat intelligence really is (and what it is not)
  • How indicators are collected and enriched
  • How teams collaborate across organizations
  • How intelligence supports detection and response

Instead of working in isolation, MISP encourages a community-driven defense mindset. It teaches beginners a critical cybersecurity lesson: defense improves when knowledge is shared. Instead of reacting to threats alone, teams work together using structured intelligence to detect and prevent attacks earlier.

For beginners, MISP is less about mastering every feature and more about understanding how intelligence is collected, contextualized and responsibly shared. These skills form a strong foundation for careers in SOC operations, threat intelligence and incident response.

Posted on

Splunk for Beginners: Making Sense of Logs and Security Data

Hello, aspiring ethical hackers. In our previous blogpost, you learnt about Blue Teaming. In this article, you will learn about Splunk, a platform that plays a vital role in Blue Teaming. When you start learning cybersecurity, one of the first things you hear is: “Check the logs.” But what logs? Where are they stored? And how do you make sense of millions of events generated every day? This is where this platform comes in.

Splunk is a powerful platform that helps organizations collect, search, analyze and visualize machine data. For beginners, it serves as an excellent introduction to how real security teams monitor systems, investigate incidents and find suspicious activity.

What Is Splunk?

Splunk is a data analytics platform that specializes in machine-generated data, such as logs from servers, applications, firewalls, endpoints and cloud services. It is widely used by Security Operations Centers (SOCs), IT teams and incident responders.

It is commonly used for:

  • Log management
  • Security monitoring
  • Incident investigation
  • Operational troubleshooting

In simple terms, Splunk helps answer the question:
“What is happening across my systems right now and what happened in the past?”

How Splunk Works?

At a high level, it works in three main steps. They are,

1. Data Ingestion:

Splunk collects data from many sources, such as:

  • Operating system logs
  • Application logs
  • Network devices
  • Cloud services

This data is indexed so it can be searched quickly.

2. Searching and Analysis:

Once data is indexed, users can search it using the Splunk Search Processing Language (SPL). Beginners don’t need to master SPL immediately. Basic searches are often enough to get started.

3. Visualization and Alerts:

It also allows users to create:

  • Dashboards
  • Charts and graphs
  • Alerts based on conditions

These features help teams spot issues quickly and track trends over time.

Common Security Use Cases of Splunk

It is widely used in cybersecurity for tasks such as:

  • Log analysis – Reviewing authentication attempts, errors and access logs
  • Threat detection – Identifying suspicious behavior or anomalies
  • Incident investigation – Reconstructing timelines during security incidents
  • Compliance monitoring – Tracking access and configuration changes
  • SOC dashboards – Providing real-time visibility into security events

Many SOC analysts spend a large part of their day inside Splunk.

Splunk in a SOC Workflow

This platform is usually part of a larger security ecosystem. A simplified SOC workflow looks like this:

  1. Systems and applications generate logs
  2. Logs are sent to Splunk
  3. Alerts are created based on suspicious patterns
  4. Analysts investigate events in Splunk
  5. Findings are escalated or documented

It helps connect alerts to actual evidence, instead of treating them as isolated warnings.

Splunk Vs SIEM

Beginners often hear Splunk described as a SIEM (Security Information and Event Management) tool. While it can really act as a SIEM, its core strength is data analysis.

  • Traditional SIEMs often focus on predefined security rules
  • Splunk focuses on flexible searching and analysis

Why Splunk Matters for Beginners?

Beginners often focus on individual tools or attacks, but real-world security work is about visibility and context. Splunk teaches beginners how to:

  • Work with large volumes of log data
  • Identify patterns and anomalies
  • Investigate alerts using evidence
  • Think like a SOC analyst

Learning this early helps bridge the gap between theory and real operational security. Moreover, Splunk skills are in high demand across:

Even basic knowledge of this helps beginners understand how organizations monitor and investigate their environments. The skills you learn: log analysis, correlation and investigation transfer easily to other tools.

What Beginners Should Focus On First?

Splunk can feel overwhelming at first. To make learning simple, beginners should focus on a few fundamentals:

  • Understanding what logs are and why they matter
  • Learning basic search queries
  • Reading timestamps and event fields
  • Building simple dashboards
  • Following investigation workflows

You do not need to learn advanced SPL or automation on day one.

Challenges Beginners May Face

It’s normal to face some challenges when learning Splunk, such as:

  • Large volumes of data
  • Complex search syntax
  • Too many dashboards and features
  • Difficulty knowing what is “normal” behavior

These challenges improve with practice and exposure. Labs and sample datasets are especially helpful for beginners.

Conclusion

Splunk is not just a tool. It’s a way of thinking about data and security. For beginners, it provides a practical window into how real-world security teams detect problems, investigate incidents and make decisions based on evidence.

By learning this early, beginners gain confidence working with logs, understanding alerts and seeing the bigger picture of cybersecurity operations. As you progress, this tool becomes not just a platform you use, but a skill that supports almost every area of modern security work.

Posted on

TheHive for Beginners: Managing Security Incidents the Smart Way

Hello, aspiring ethical hackers. In our previous blogpost, you have learnt about Blue Teaming. In this article, you will learn about TheHive, a platform that helps manage security incidents the smart way. When learning cybersecurity, many beginners focus on tools that detect threats—alerts, logs and suspicious activity. But detection is only the beginning. Once an alert fires, security teams still need to track, investigate, collaborate and document what happens next. This is where TheHive becomes important.

TheHive is a security incident response platform designed to help teams manage investigations in an organized, repeatable and collaborative way. For beginners, it provides a structured introduction to how real-world security operations centers (SOCs) handle incidents.

What Is TheHive?

TheHive is an open-source Security Incident Response Platform (SIRP) used by SOCs and DFIR teams to manage security alerts and incidents. Instead of relying on spreadsheets, emails or chat messages, teams use TheHive to centralize investigations in one place.

TheHive was developed by TheHive Project and is widely adopted by blue teams because it focuses on workflow, collaboration and documentation, not just tools.

In simple terms, TheHive answers the question:
“How do we handle security incidents in an organized and consistent way?”

Core Concepts of TheHive

If you want to learn about TheHive, you should begin with understanding a few key concepts which make it much easier to learn.

Alerts:

Alerts are raw security signals coming from other tools, such as SIEMs, EDR platforms or scripts. Alerts may indicate suspicious activity, but they are not yet confirmed incidents.

Cases:

A case is created when an alert is worth investigating. A case represents an incident under investigation and contains all related information, tasks and evidence.

Tasks:

Tasks break an investigation into actionable steps, such as:

  • Review logs
  • Analyzing an IP address
  • Collect endpoint data
  • Write a summary

Observables:

Observables are pieces of data related to an incident, such as:

  • IP addresses
  • Domains
  • File hashes
  • Email addresses

How TheHive Fits into a SOC Workflow

TheHive is not a detection tool. It sits after detection in the security workflow. A simplified SOC workflow looks like this:

  1. A security tool generates an alert
  2. The alert is sent to TheHive
  3. An analyst reviews the alert
  4. A case is created if investigation is needed
  5. Tasks are assigned and completed
  6. Findings are documented and closed

For beginners, this provides a clear picture of how alerts turn into real investigations.

Collaboration and Case Management

One of TheHive’s biggest strengths is its collaboration. Using TheHive, multiple analysts can:

  • Work on the same case
  • Add notes and evidence
  • Assign tasks to each other
  • Track progress in real time

This reflects how real SOCs operate.

TheHive Compared to Other Security Tools

Beginners sometimes confuse TheHive with tools like SIEMs or forensic frameworks. However, there is lot of difference between them.

  • SIEMs focus on collecting and correlating logs
  • EDR tools focus on endpoint detection and response
  • Forensic tools focus on deep technical analysis
  • Whereas TheHive focuses on managing the investigation process

TheHive does not replace all the above other tools but it connects them together through workflow.

Why Beginners Should Learn TheHive?

Beginners often learn tools like scanners, SIEMs or forensic utilities, but struggle to understand how investigations are actually managed. TheHive fills this gap by teaching:

  • How alerts become investigations
  • How tasks are assigned and tracked
  • How evidence and notes are documented
  • How multiple people collaborate on the same incident

Learning TheHive helps beginners think like SOC analysts, not just tool operators.

Challenges Beginners May Face

Like any platform, TheHive has a learning curve. Beginners may find:

  • Case workflows unfamiliar at first
  • The number of features overwhelming
  • Integration concepts confusing

These challenges are normal. Beginners should focus on basic case creation, tasks and documentation before exploring automation or integrations.

Conclusion

TheHive teaches one of the most important cybersecurity lessons: handling incidents is as important as detecting them. For beginners, it provides a realistic view of how SOCs and DFIR teams organize investigations, collaborate and learn from incidents.

By learning TheHive early, beginners build strong foundations in incident response thinking—skills that remain valuable regardless of which tools or technologies they use in the future.

Posted on

Beginners guide to Threat Hunting

Hello aspiring Ethical Hackers. In our previous blogpost, you learnt about Blue Teaming. In this article, you will learn about Threat Hunting, which plays a powerful role in Blue Teaming. In today’s digital landscape, cyber threats are becoming increasingly sophisticated. Attackers often hide deep within networks, evading traditional security tools like antivirus software and firewalls. So how do organizations detect these stealthy intrusions before they cause serious damage? That’s where threat hunting plays an important role.

If you’re new to cybersecurity or curious about how security professionals find hidden threats, this beginner’s guide to threat hunting will explain what it is, why it matters and how to get started.

What is Threat Hunting?

Threat hunting is the process in which a proactive search is performed to detect malicious activity or threats within a network or system that have evaded existing security defenses. Instead of waiting for automated alerts, threat hunters actively look for suspicious patterns, behaviors or anomalies that indicate an attacker might be lurking undetected.

Think of it as a detective searching for clues that a criminal has been in the building — even when alarms haven’t gone off. Unlike reactive approaches (such as responding to alerts), hunting threats focuses on finding what security tools might have missed by leveraging human intuition, knowledge, experience and analytical skills.

Why Is Threat Hunting Important?

1. Early Detection of Advanced Threats:

Many modern attackers use highly advanced techniques designed specifically to avoid detection. Threat hunting helps find these stealthy attackers early, reducing the attacker’s ‘dwell time’. ‘Dwell time’ is the time attackers spend inside a network they have compromised.

2. Improves Overall Security Posture:

By uncovering hidden threats and attack techniques, threat hunters provide valuable feedback to improve the organization’s detection rules, incident response processes etc.

3. Reduces Damage and Costs:

The sooner an attacker is detected, the less damage they can do — whether it’s stealing data, disrupting operations or installing ransomware. So it reduces damage and costs.

4. Empowers Security Teams:

Threat hunting encourages curiosity, creativity and deeper understanding of your environment, turning security analysts into proactive defenders.

Common Threat Hunting Techniques

Threat hunting blends data analysis, hypothesis-driven investigation and tool usage. Here are some popular approaches:

1. Hypothesis-Driven Hunting:

In this technique, Threat Hunters start with a theory or suspicion, like “What if an attacker already in our network is using PowerShell to run malicious scripts?” They then look for signs matching this hypothesis.

2. Anomaly Detection:

In this type of hunting, threat hunters search for unusual behavior that stands out, such as:

  • A user logging in at odd hours
  • Unexplained data transfers
  • Processes launching unexpectedly

3. Tactical Hunting based on Threat Intelligence:

In this technique, threat hunters use known Indicators of Compromise (IOCs) like IP addresses, domain names or file hashes linked to malware campaigns.

4. Behavioral Analysis:

In this technique, threat hunters focus on patterns of activity (e.g., lateral movement or privilege escalation) rather than specific malware signatures.

Keys for successful Threat Hunting

Successful threat hunting relies on access to good data and other factors. They are:

  • Security Information and Event Management (SIEM) platforms: These help in centralizing logs and provide search/query capabilities (e.g., Splunk, Elastic Stack, QRadar).
  • Endpoint Detection and Response (EDR) tools: These tools monitor endpoint behavior in real-time (e.g., CrowdStrike, Carbon Black).
  • Network Traffic Analysis: This helps in examining network packets for suspicious activity (e.g., Zeek, Wireshark)
  • Threat Intelligence Feeds: Provide updated information on attacker tactics and IOCs.
  • Scripting Languages: Python or PowerShell are used to automate data analysis and custom hunting queries.

Threat Hunting Process for beginners

Here’s a Step-by-step process you can follow to start threat hunting:

Step 1: Understand your network environment:

Before you can find anomalies or threats, you need to first know what “normal” looks like for your network. Study your network architecture, user behaviors, typical processes and baseline logs.

Step 2: Formulate a Hypothesis:

Once you have understood your environment, formulate a Hypothesis. Start with a focused question or theory relevant to your target network. For example:

  • “Are there signs of credential dumping?”
  • “Is anyone using PowerShell scripts outside of business hours?”
  • “Is there unusual DNS traffic indicating data exfiltration?”

Step 3: Collect and Analyze Data:

Once you have a hyposthesis, gather logs from endpoints, servers, firewalls and other relevant network devices. Use your SIEM or EDR tools to search for patterns that support or disprove your hypothesis.

Step 4. Investigate Anomalies:

If you spot any anomalies or unusual events while analyzing, dig deeper. Cross-reference with threat intelligence, check related logs and look for lateral movement or privilege escalation attempts.

Step 5. Document Findings and Take Action:

Record if you find anything suspicious including timelines, affected assets and attacker behavior. Alert your incident response team or take remediation steps as necessary.

Step 6: Refine and Repeat:

Always remember Threat hunting is an iterative process. Use lessons learned to update detection rules, improve data collection and form new hypotheses.

Conclusion

Threat hunting is a powerful, proactive approach to cybersecurity that complements automated defenses by leveraging human insight and analysis. Whether you’re a security analyst, IT professional or just passionate about cybersecurity, developing threat hunting skills will make you a valuable defender in today’s complex threat landscape.