c0c0n 2026

c0c0n is a 19 years old platform that is aimed at providing opportunities to showcase, educate, understand and spread awareness on Information Security, data protection, and privacy...

Venue & Date

c0c0n 3-Day Professional Training

HuntOps: From Telemetry to Adversary Detection

Abstract

Modern adversaries rarely rely on single techniques, they operate across endpoints, identity systems, and cloud environments, leaving behind fragmented signals that traditional detection approaches often miss.

This training delivers a hands-on, telemetry-driven approach to modern threat hunting and detection engineering across on-premises and cloud environments.

Participants will learn core hunting methodologies, detection engineering, and hands-on log analysis using Splunk Enterprise. The course also covers malware detection with YARA and integrating threat intelligence using OpenTAXII and MISP.

Through real-world attack scenarios across On-Premises, Active Directory, and Azure, along with data-driven hunting using Python and machine learning, participants will gain practical skills to detect, investigate, and respond to advanced threats at scale.

Course Content

Module 1: Threat Hunting Foundations & Methodology
  • Understand proactive threat hunting and SOC integration models
  • Apply the Pyramid of Pain to prioritize detections
  • Use the Diamond Model of Intrusion Analysis to analyze adversary behavior
  • Perform hypothesis-driven threat hunts
  • Map detections to MITRE ATT&CK techniques
Module 2: SIEM-Based Detection Engineering with Splunk
  • Understand Splunk architecture, components, and data pipelines
  • Write efficient SPL queries for threat hunting
  • Build detections, alerts, and scalable search workflows
  • Organize and manage security data for high-fidelity detection
Module 3: Malware Hunting & Detection Engineering
  • Apply detection engineering principles on real APT malware samples
  • Perform malware hunting using known APT toolmarks and signatures
  • Integrate YARA with SIEM pipelines for automated detection
Module 4: Threat Intelligence Driven Hunting
  • Leverage intelligence-driven hunting methodologies
  • Understand STIX/TAXII frameworks and threat data sharing
  • Enrich and correlate telemetry with IOC intelligence
  • Perform hunts using real-world threat intelligence feeds
Module 5: On-Premises Threat Hunting
  • Reconstruct enterprise attack paths used by APT groups
  • Initial access techniques :-
    • Spear-phishing attachments (APT28, APT29)
  • Credential access :-
    • Credential dumping (APT29)
  • Lateral movement & persistence :-
    • Proxy-based C2 routing and internal pivoting (APT28)
    • Registry Manipulation (APT 29)
    • Scheduled Tasks (Indian APT SideWinder)
  • Data Exfiltration :-
    • DNS Query (APT 29)
    • File Storage Services (APT 32)
  • Detect long-term stealthy persistence typical of APT campaigns
Module 6: Active Directory Attack Detection & Hunting
  • Analyze AD-focused attack techniques used by APT groups
  • Detect identity-based attacks
    • Pass-the-Hash, Kerberoasting, ticket abuse (APT29)
  • Hunt for domain dominance techniques :-
    • Privilege escalation and persistence in AD environments
  • Identify abnormal behaviour :-
    • Unusual Authentication
    • Ticket Anomalies
  • Correlate AD logs with known APT behaviors and TTPs
  • Build detections mapped to real-world identity attack scenarios
Module 7: Cloud Threat Hunting (Azure / Entra ID)
  • Understand how APT groups target cloud and identity providers
  • nalyze cloud attack paths used by APT groups :-
    • Midnight Blizzard/APT 29
    • Storm Blizzard/APT 28
  • Use Entra ID telemetry for detection and investigation of real-world cloud attack scenarios
Module 8: Advanced Data-Driven Hunting with Machine Learning
  • Use Python and notebooks for large-scale hunting
  • Process and analyze high-volume security datasets
  • Apply anomaly detection techniques
  • Visualize and investigate anomalies effectively
  • Reduce false positives and improve detection accuracy
  • Integrate ML-driven insights into hunting workflows
Course Learning Outcomes

By the end of this training, participants will be able to:

  • Perform hypothesis-driven threat hunting using real-world threat intelligence feeds
  • Build detections, alerts, and scalable search workflows in Splunk
  • Write and optimize YARA rules for malware detection
  • Detect identity-based attacks in Active Directory environments
  • Analyze attack paths in Azure cloud environments and build detections for real-world attack scenarios
  • Use Python for large-scale hunting
  • Integrate ML-driven insights into hunting workflows


Pre-requisite
  • Basic understanding of cybersecurity concepts and attack techniques
  • Familiarity with networking fundamentals (TCP/IP, DNS, HTTP/HTTPS)
  • Working knowledge of operating systems (Windows/Linux basics)
  • Exposure to security logs and SIEM concepts
  • Basic scripting knowledge (Python preferred, but not mandatory)
  • Understanding of Azure cloud fundamentals is beneficial but not mandatory
What Attendees Will Get
  • Hands-on experience with real-world threat hunting scenarios
  • Practical labs covering SIEM, cloud, and data-driven hunting
  • Exposure to industry tools like Splunk Enterprise, OpenTAXII, and MISP
  • Ready-to-use detection queries and hunting techniques
  • Lab datasets and pre-configured environments for practice
  • End-to-end understanding of attack paths across On-Premises, Active Directory, and Azure Environment
Who Should Attend
  • Security Analysts (SOC Analysts Tier 1/2/3)
  • Threat Hunters and Detection Engineers
  • Incident Responders and Blue Team Professionals
  • Cyber Threat Intelligence Analysts
  • Cloud Security Engineers
  • Security Engineers and SOC Leads
  • Professionals looking to transition into threat hunting roles
  • Anyone interested in proactive detection and advanced threat analysis
What Students Should Bring
  • Laptop with a 64-bit (AMD64/x86_64) processor architecture, minimum 16 GB RAM and 60–80 GB free disk space
  • Ability to run VMware Workstation Pro hypervisor
  • A modern web browser and terminal environment

[ Note: Systems with Apple Silicon (M-series) or other ARM-based CPUs are not supported ]

What Not to Expect
  • 0-day exploits will not be covered
  • Deep dive into malware reverse engineering or exploit development
  • Fully automated “one-click” detection solutions

Trainer(s)

Abhijeet Kumar

Security Researcher
CyberWarFare Labs

Rahul Chakraborty

Blue Team Security Researcher
CyberWarFare Labs