Back to Home

Detection Engineering

The art and science of building high-quality, high-fidelity detection rules.

Detection Mechanisms

File-Based Detection (Hashing)

Foundational but easily bypassed by modifying a single bit.

CryptographicMD5, SHA256. Exact matches only.
ImphashImport Hash. Detects variants with same imports.
Fuzzy HashSSDEEP. Detects similar files (70% match).

OS Internals & Monitoring

Windows (ETW, AMSI)

ETW (Event Tracing for Windows): Kernel-level telemetry. The backbone of EDR.
AMSI: Allows apps to send content (scripts, macros) to AV for scanning before execution.

Linux (eBPF, Auditd)

eBPF: Runs sandboxed programs in kernel. High performance, massive observability.
fanotify/inotify: File system monitoring hooks.

Rule Languages

YARA

The "grep" for malware. Scans files and memory for byte sequences and strings.

rule Detect_Malware {
  strings:
    $a = "suspicious_string"
  condition:
    $a
}

Sigma

Generic signature format for SIEM detection rules. "Write once, deploy anywhere".

detection:
  selection:
    EventID: 4688
    CommandLine|contains: 'powershell'

Ready to put this into practice?

Master the 9-step Detection Engineering Methodology in our interactive drill.

Start Methodology Drill