Incident Response & Threat Hunting
Effective DFIR begins with a structured methodology and the discipline to preserve evidence before acting. Every decision in the field has downstream forensic consequences.
IR Lifecycle — PICERL (6 Phases)
Order of Volatility — Evidence Collection Priority
Collect the most volatile evidence first — it will disappear when the system is powered off or rebooted. Per RFC 3227, volatility determines collection sequence.
IOC vs. IOA — Quick Reference
IR Methodology & Evidence Integrity
Sound incident response depends on forensically sound evidence collection. Every action in the field must consider its impact on evidence integrity and legal admissibility.
Evidence Integrity — Core Requirements
| Dimension | Triage Acquisition | Full Forensic Acquisition |
|---|---|---|
| Speed | Fast — targeted collection of key artifacts only | Slow — complete bit-for-bit disk image (hours for large drives) |
| Completeness | Partial — may miss artifacts not in targeted locations | Complete — captures everything including deleted files, slack space |
| System state | Can be performed on live running system (preserves volatile data) | Usually requires offline/powered-off system for disk imaging |
| Legal weight | Lower — may not meet evidentiary standards for court | Higher — full chain of custody, hash verification, forensically sound |
| Best for | Initial scoping, large enterprise with many systems, IR triage | Deep investigation, litigation, regulatory investigations |
| Tools | Kansa, CrowdStrike, Velociraptor, KAPE | FTK Imager, EnCase, dd, dcfldd, Autopsy |
RAM must be acquired BEFORE system shutdown or isolation where operationally possible. It contains running processes, network connections, decrypted malware, and encryption keys — none of which survive a power cycle.
| Tool | Platform | Notes |
|---|---|---|
| WinPmem | Windows | Open source; produces raw or AFF4 memory images; requires admin rights |
| Magnet RAM Capture | Windows | Free; GUI-based; good for first responders; outputs raw memory image |
| FTK Imager | Windows | Also captures memory (in addition to disk); widely accepted in legal proceedings |
| LiME (Linux Memory Extractor) | Linux | Loadable kernel module; only method that fully captures kernel memory on Linux |
| OSXPmem / avml | macOS / Linux | avml is Microsoft's open-source Linux memory acquisition tool |
| Consideration | Details |
|---|---|
| Authorization | Ensure written authorization from system/data owner before collecting evidence. Corporate IR teams typically operate under employment agreements; law enforcement requires warrants or consent. |
| Jurisdiction | Cross-border incidents (cloud, remote employees) may trigger multiple legal frameworks (GDPR, CFAA, local law). Engage legal counsel early for multi-jurisdictional incidents. |
| Privacy Laws | Employee monitoring, personal data collection, and cross-border data transfer all carry legal constraints. GDPR requires data minimization even in IR contexts. |
| Evidence Admissibility | For criminal prosecution: chain of custody, forensically sound collection, and expert witness qualification. Corporate investigations have lower evidentiary bars but should still follow best practices. |
| Notification Obligations | Regulatory breach notification timelines vary: GDPR = 72 hours; HIPAA = 60 days; SEC = 4 business days (material incidents). Engage legal before notifying regulators. |
Threat Hunting
Threat hunting is a proactive, hypothesis-driven search for threats that have evaded automated detection. Unlike alert-driven IR, hunting assumes the adversary is already inside.
Pyramid of Pain (David Bianco, 2013)
Ranks threat indicators by how much pain it causes an attacker when defenders detect and block them. Higher = harder for the attacker to change = more valuable detection.
Hypothesis-Driven Hunting Workflow
Hunting Maturity Model (HMM — Sqrrl, 2015)
| Data Source | What to Hunt | Key Evidence |
|---|---|---|
| Windows Event Logs | Logon anomalies, privilege escalation, service creation | Event IDs 4624/4625/4648 (logon), 4688 (process), 7045 (service install), 4698 (scheduled task) |
| Sysmon Logs | Process creation, network connections, file writes, registry changes | Event IDs 1 (process), 3 (network), 11 (file create), 13 (registry), 19-21 (WMI) |
| PowerShell Logs | Encoded commands, download cradles, AMSI bypass attempts | Module logging (4103), Script block logging (4104), Transcription logs |
| Network Traffic / DNS | C2 beaconing, DNS tunneling, lateral movement, data staging | Unusual outbound connections, high-entropy DNS queries, periodic beaconing patterns |
| EDR Telemetry | Process injection, credential dumping, LOLBin abuse | Parent-child process anomalies, lsass.exe access, unusual DLL loads |
| Proxy / Web Gateway | C2 over HTTP/HTTPS, staged payload downloads | User agent anomalies, low-reputation domains, unusual POST-heavy sessions |
MITRE ATT&CK Framework
ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) is a globally accessible knowledge base of adversary behaviors based on real-world observations — the essential reference for DFIR practitioners.
14 Enterprise ATT&CK Tactics — In Attack Sequence Order
| Tactic | Key Technique | ATT&CK ID | Forensic Evidence |
|---|---|---|---|
| Initial Access | Phishing: Spearphishing Attachment | T1566.001 | Email headers, .lnk files, macro-enabled Office docs, browser downloads |
| Execution | PowerShell | T1059.001 | Event ID 4103/4104, ConsoleHost_history.txt, Prefetch for powershell.exe |
| Persistence | Registry Run Keys / Startup Folder | T1547.001 | HKCU/HKLM Run keys in registry, Startup folder contents |
| Persistence | Scheduled Task/Job | T1053.005 | Event ID 4698/4702, C:\Windows\System32\Tasks\, XML task files |
| Defense Evasion | Indicator Removal: Clear Windows Event Logs | T1070.001 | Event ID 1102 (Security log cleared), 104 (System log cleared) |
| Credential Access | OS Credential Dumping: LSASS Memory | T1003.001 | Sysmon Event ID 10 (lsass.exe access), minidump files, Mimikatz artifacts |
| Lateral Movement | Remote Services: SMB/Windows Admin Shares | T1021.002 | Event ID 4624 Type 3 (network logon), net use commands, named pipes |
| Command & Control | Application Layer Protocol: Web Protocols | T1071.001 | Unusual outbound HTTP/HTTPS, periodic beaconing, proxy logs, DNS queries |
| DFIR Use Case | How ATT&CK Helps |
|---|---|
| Threat Hunting | Use ATT&CK techniques as hunting hypotheses: "Hunt for T1055 Process Injection across all endpoints" |
| Incident Scoping | Map observed artifacts to ATT&CK techniques to build a complete picture of attacker activity across the kill chain |
| Gap Analysis | Compare ATT&CK techniques used by relevant threat actors against your detection coverage — find blind spots |
| Threat Intelligence | ATT&CK groups (threat actors) document which TTPs each named group uses — enables predictive hunting |
| IR Report Writing | Map every observed attacker action to an ATT&CK ID for standardized, communicable incident reporting |
| Detection Engineering | Build SIEM rules and EDR detections targeted at specific ATT&CK technique artifacts and behaviors |
Practice Quiz — Incident Response & Threat Hunting
10 questions covering PICERL, order of volatility, evidence integrity, IOC vs. IOA, Pyramid of Pain, and MITRE ATT&CK. Select an answer then click Submit.
Memory Hooks
High-yield mnemonics and patterns to lock in IR & Threat Hunting for the GCFA.
| Fact | Answer |
|---|---|
| PICERL — full expansion in order | Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned |
| Most volatile evidence source (collect first) | RAM (physical memory) — lost on shutdown |
| Event ID for Security Log cleared (defense evasion) | Event ID 1102 (Security log cleared); Event ID 104 (System log cleared) |
| ATT&CK tactic with the most techniques | Defense Evasion (TA0005) |
| Pyramid of Pain — highest level indicator | TTPs — Tactics, Techniques & Procedures (hardest for attacker to change) |
| Pyramid of Pain — lowest level indicator | Hash Values — trivial to change by recompiling malware |
| ATT&CK tactic covering LSASS dumping with Mimikatz | Credential Access (TA0006) — T1003.001 |
| Purpose of a write blocker | Prevents any write commands to original evidence — allows read without modification |
| Hunting maturity level that uses hypothesis-driven TTPs | Level 2 — Procedural (uses documented hunting procedures based on ATT&CK) |
| RFC 3227 | Guidelines for Evidence Collection and Archiving — defines order of volatility |
Flashcards & Study Advisor
Click any card to flip it. Use the Study Advisor for targeted guidance by topic area.
What does PICERL stand for and what is the critical rule about Eradication?
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned. Critical rule: never eradicate BEFORE thorough forensic analysis — premature cleanup destroys evidence needed to understand the full scope of the intrusion.
What is the order of volatility and why does it matter?
Evidence collection priority from most to least volatile: RAM → Swap → Network state → Running processes → Disk → Remote logs → Archives. It matters because volatile evidence disappears when power is removed — lose RAM and you lose fileless malware, decryption keys, and live attacker connections forever.
What is the difference between an IOC and an IOA, and which is harder to evade?
IOC = artifact of past compromise (hash, IP, domain) — reactive, easily evaded by changing the artifact. IOA = behavioral evidence of attacker actions in progress (credential dumping, LOLBin abuse) — harder to evade because changing TTPs requires retooling the entire attack methodology.
What is the Pyramid of Pain and what sits at its top?
David Bianco's model ranking indicators by pain caused to attackers when detected. Bottom (trivial): Hashes. Then: IPs, Domains, Network/Host Artifacts, Tools. Top (tough!): TTPs. Higher on the pyramid = harder for the attacker to change = more valuable for defenders to detect.
Name the 14 MITRE ATT&CK tactics in attack sequence order.
Reconnaissance → Resource Development → Initial Access → Execution → Persistence → Privilege Escalation → Defense Evasion → Credential Access → Discovery → Lateral Movement → Collection → Command & Control → Exfiltration → Impact. (14 total; first 2 are pre-attack.)
What is threat hunting and what is its core assumption?
Threat hunting: proactive, hypothesis-driven search for threats that have evaded automated detection. Core assumption: assume breach — the adversary is already inside and operating undetected. Unlike alert-driven IR, hunting does not wait for alerts — it actively seeks threats through behavioral analysis.
What are the three non-negotiable requirements for forensically sound evidence?
1. Write blocker — prevents modification of original evidence during acquisition. 2. Hash verification — SHA-256 hash before and after imaging proves no change occurred. 3. Chain of custody — unbroken documented record of all handling. All three required for legal admissibility.
What ATT&CK tactic is most heavily populated, and what Windows Event IDs indicate an attacker attempted it?
Defense Evasion (TA0005) — the most populated ATT&CK tactic. Key Event IDs: 1102 (Security log cleared) and 104 (System log cleared) — direct evidence of attacker log tampering. Also: timestomping (T1070.006), masquerading, obfuscation, and LOLBin abuse all fall under Defense Evasion.
Ready to pass the GCFA?
Reinforce Incident Response & Threat Hunting with full-length practice tests on FlashGenius.
Unlock Full Practice Tests on FlashGenius →Exam Strategy — IR & Threat Hunting
- PICERL sequence questions: The order is fixed. Any question about "what comes first" — Preparation is always before the incident. Containment preserves evidence while limiting spread; Eradication removes the threat only after analysis is complete.
- Order of volatility: RAM = always first. Disk = survives power cycle. If a question asks "what to collect before shutdown" → memory. "What survives a reboot" → disk artifacts (Event Logs, registry, MFT).
- IOC vs IOA: The exam loves this distinction. Key tell: if it's a hash/IP/domain → IOC. If it's behavior (credential dumping, LOLBin abuse, unusual process spawning) → IOA. IOAs survive attacker tooling changes; IOCs do not.
- Pyramid of Pain top = TTPs: Any question about "what is hardest for attackers to change" or "what gives defenders the most advantage" → TTPs. The bottom of the pyramid (hashes) are trivially evaded.
- ATT&CK tactic ID questions: Defense Evasion = TA0005. Initial Access = TA0001. Credential Access = TA0006. Know the most tested: Persistence (TA0003), Defense Evasion (TA0005), Lateral Movement (TA0008).
Common Mistakes to Avoid
- Powering off before memory capture: The most common field mistake. Never pull the plug before acquiring RAM — fileless malware, encryption keys, and C2 connections only exist in memory.
- Running AV on live evidence: AV modifies files (quarantines, deletes), changes timestamps, and destroys forensic artifacts. Never run AV before forensic acquisition is complete.
- Confusing IOC and IOA: "Attacker changes the malware hash" → the IOC is now useless. The IOA (behavior) remains valid. The exam will present scenarios where hash-based detection fails and test whether you know why.
- Eradication before analysis: Premature eradication is the #1 mistake that causes re-compromise. If you clean up before finding all persistence mechanisms, the attacker is back in 24 hours.
- Treating all 14 ATT&CK tactics as sequential: They are not strictly linear — adversaries often run multiple tactics simultaneously (Persistence + Defense Evasion happening at the same time). The order shown is a general progression, not a strict sequence.
Quick Review — Key Facts
- PICERL: Preparation → Identification → Containment → Eradication → Recovery → Lessons Learned
- Order of volatility (top 4): RAM → Swap/Page file → Network state → Running processes
- Evidence integrity triad: Write blocker + Hash verification + Chain of custody
- IOC: artifact (hash/IP/domain) — reactive, easily evaded
- IOA: behavior — proactive, survives tool changes
- Pyramid top: TTPs. Pyramid bottom: Hash values
- 14 ATT&CK tactics: Recon → Resource Dev → Initial Access → Execution → Persistence → Privilege Esc → Defense Evasion → Credential Access → Discovery → Lateral Movement → Collection → C2 → Exfiltration → Impact
- Log cleared Event IDs: 1102 (Security), 104 (System)
Deep Dive — Advanced Concepts
- Fileless malware and memory forensics: Modern APTs increasingly use fileless techniques — malware that runs entirely in memory with no disk artifact. The only way to detect it is RAM acquisition and memory forensics (Volatility). Event Log analysis and disk forensics alone will miss it entirely.
- GDPR and IR tension: GDPR requires data minimization even during IR — you cannot collect employee personal data without legal basis. Many organizations use a legitimate interest basis for IR investigations but must document this. Cross-border evidence collection (EU data on US servers) triggers GDPR constraints regardless of where the investigation originates.
- ATT&CK Navigator for gap analysis: The ATT&CK Navigator tool lets you layer your organization's detection coverage over ATT&CK techniques. Gaps in coverage reveal where a motivated adversary could operate undetected — directly informing threat hunting priorities.
- Living-off-the-Land (LOLBins): Adversaries abuse legitimate Windows binaries (certutil.exe, mshta.exe, regsvr32.exe, wmic.exe) to execute malicious code. These bypass hash-based AV detection because the tools themselves are legitimate. Detection requires behavioral analysis — parent-child process anomalies, command-line argument inspection, and destination analysis. This is IOA territory.
- Hunting at scale: Enterprise hunting requires centralizing telemetry across thousands of endpoints. Velociraptor is a GCFA-relevant tool for large-scale forensic artifact collection and hunting — it can collect specific artifacts (prefetch, event logs, registry) from thousands of endpoints simultaneously without full disk imaging.
Practice Tips
- Map every scenario to PICERL: For any IR scenario question, identify which phase you're in first — this immediately narrows the correct action. "Active intrusion discovered" → Containment phase. "Malware removed, monitoring for re-infection" → Recovery phase.
- Practice the Pyramid from memory: Draw the 6 levels without looking. Then for each level, write one concrete example. This builds the pattern recognition needed for scenario-based questions.
- Build ATT&CK technique-to-evidence mappings: For the most common techniques (PowerShell, WMI, LSASS dumping, log clearing, lateral movement), know the specific Event IDs and forensic artifacts. This links Domain 1 (IR) to Domains 2-4 (Windows forensics, memory analysis, timeline).
- Practice hunt hypothesis writing: Take any ATT&CK technique and write a hunting hypothesis for it. Then identify what data sources you'd query and what anomalies you'd look for. This is core to GCFA practical thinking.
- Learn Event IDs 4624, 4625, 4648, 4688, 4698, 4702, 7045, 1102, 104: These are the most commonly tested Event IDs in GCFA scenarios. Know what each one means, which log it appears in, and what attacker activity it may indicate.