SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsExploring the power of the PEAK Threat Hunting framework
On this month’s SANS Threat Analysis Rundown, I was joined by three distinguished guests from Splunk: David Bianco, Dr. Ryan Fetterman, and Sydney Marrone. We explored their cutting-edge framework for threat hunting known as PEAK: Prepare, Execute, and Act with Knowledge. We discussed how they conceptualized and created PEAK and how it can be applied by security professionals. Here's a recap of the discussion.
The PEAK framework represents a modern approach to threat hunting. It builds upon foundational principles to guide organizations in enhancing their cybersecurity capabilities. David, Ryan, and Sydney used their collective expertise to shape the creation of PEAK, with a goal to provide practical, adaptable guidance for teams at varying levels of maturity. PEAK emerged as a response to the evolution of threat hunting, incorporating insights from earlier frameworks while addressing gaps in metrics, automation, and operational integration.
A good place to start with understanding PEAK is with understanding threat hunting. At its core, threat hunting involves identifying security incidents missed by automated detections. While this practice has existed for years, PEAK introduces a structured process with three main types of hunts:
PEAK’s strength lies in its systematic design. The framework is divided into three phases:
David emphasized that PEAK is not just a technical guide but a holistic approach that integrates metrics, reporting, and program management.
While metrics may not be a popular topic, we all agreed that they can be powerful to demonstrate the value of threat hunting and drive continuous improvement. Several key metrics that can show impactful outcomes include:
Metrics allow teams to showcase their impact, justify resources, and track progress over time. The team highlighted that even hunts that don’t reveal active threats can yield valuable insights about the environment.
A unique aspect of PEAK that differentiates it from other frameworks is that it calls out Model-Assisted Threat Hunting (appropriately abbreviated MATH). MATH focuses on leveraging algorithms, data science, and machine learning to enhance the hunting process. Unlike traditional detection approaches, which aim to create long-term, always-on analytics, MATH is about using machine learning techniques to generate insights and leads for specific threat-hunting efforts. Ryan explained that the purpose of MATH is not to replace human analysts but to augment their capabilities by tackling challenges that are otherwise too complex or time-intensive. MATH can be a tool to take a tough problem and make it more approachable as well as explore creative paths that might yield novel results.
MATH encompasses a broad range of data science and machine learning methods that can be tailored to various problems. Ryan outlined key approaches, emphasizing their practical applications:
MATH is especially valuable for exploring environments where traditional baselines are unavailable, developing targeted algorithms to address specific detection challenges, and identifying subtle patterns that might be missed by rule-based approaches.
Audience members asked about practical concerns, such as the scope and timeframes for hunts and dealing with benign anomalies. The team explained that PEAK encourages flexibility: Teams can adjust hunts based on resource availability and organizational needs. Handling benign anomalies is a common challenge for many threat hunters, and the team suggested allow-listing and documenting known benign behaviors to streamline future hunts. The baseline hunting phase was particularly useful for understanding normal operations in unfamiliar environments.
The team shared examples of using PEAK to uncover misconfigurations, missing data, and suspicious behaviors. Sydney emphasized the importance of documenting findings and sharing them across security teams to maximize impact. One audience member inquired about adopting PEAK with limited resources. David recommended starting small—focusing on one phase or specific metrics—and building incrementally. PEAK’s adaptability allows for gradual implementation, making it suitable even for single administrators or small teams.
We closed on a positive note with what we’re optimistic about in cybersecurity for 2025:
As cybersecurity challenges continue to evolve, frameworks like PEAK, coupled with community-driven initiatives, are vital for staying ahead of adversaries. By embracing the principles of PEAK, organizations can enhance their threat detection capabilities, drive continuous improvement, and ultimately make life harder for adversaries. For those looking to deepen their understanding, check out the PEAK framework here.
Katie is the Director of Intelligence at Red Canary. She has worked on cyber threat intelligence, network defense, and incident response for nearly a decade for the U.S. Department of Defense, MITRE, Raytheon, and ManTech.
Read more about Katie Nickels