Pivot and hunting tools and services
Remembering back to earlier in this chapter, we discussed different file and infrastructure threat hunting and pivoting opportunities. In this section, we're going to focus on how to pivot and hunt on those same opportunities using free and open source tools readily available to any analyst. All the tools we will cover in this section support free user accounts to perform hunting and pivoting, but many offer several tiers of paid registration, which we sometimes recommend. The tools we will touch upon are really only a small subset of the many free and great resources available online. Throughout this section, we're going to use the tools we examine to illustrate and show examples of rudimentary pivots.
Many of the tools mentioned in this section can be used for file and infrastructure pivots, and as such, we will focus on the tools that meet the following criteria:
- Are free
- Contain a wide variety of data points
- Prove...