Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. Yeti will also automatically enrich observables (e.g. resolve domains, geolocate IPs) so that you don't have to. Yeti provides an interface for humans (shiny Bootstrap-based UI) and one for machines (web API) so that your other tools can talk nicely to it.
Yeti was born out of frustration of having to answer the question "where have I seen this artifact before?" or Googling shady domains to tie them to a malware family.
In a nutshell, Yeti allows you to:
- Submit observables and get a pretty good guess on the nature of the threat.
- Inversely, focus on a threat and quickly list all TTPs, Observables, and associated malware.
- Let responders skip the "Google the artifact" stage of incident response.
- Let analysts focus on adding intelligence rather than worrying about machine-readable export formats.
- Visualize relationship graphs between different threats.
- Collecting and processing observables from a wide array of different sources (MISP instances, malware trackers, XML feeds, JSON feeds...)
- Providing a web API to automate queries (think incident management platform) and enrichment (think malware sandbox).
- Export the data in user-defined formats so that they can be ingested by third-party applications (think blocklists, SIEM).
Installation
There's are a few handy bootstrap scripts in /extras that you can use to install a production instance of Yeti.
If you're really in a hurry, you can
curl | bash them.$ curl https://raw.githubusercontent.com/yeti-platform/yeti/master/extras/ubuntu_bootstrap.sh | sudo /bin/bashPlease refer to the full documentation for more detailed steps.Docker images
Yeti has a
docker-compose script to get up and running even faster; this is useful for testing or even running production instances of Yeti should your infrastructure support it. Full instructions here, but in a nutshell:$ git clone https://github.com/yeti-platform/yeti.git
$ cd yeti/extras/docker/dev
$ docker-compose upUseful links
via KitPloit
Related word
- Bluetooth Hacking Tools Kali
- Hacking Tools Mac
- Hacking Tools For Games
- Pentest Tools Open Source
- Hack Apps
- Hacking Tools Windows 10
- Pentest Tools Find Subdomains
- Hack Tool Apk
- Hacking Apps
- Hack Tools 2019
- Best Hacking Tools 2019
- Hacking Tools For Kali Linux
- Tools 4 Hack
- Pentest Tools List
- Hack Tools
- Hacking Tools Software
- Hackers Toolbox
- Free Pentest Tools For Windows
- Best Hacking Tools 2020
- Black Hat Hacker Tools
- Hacker Tools Free Download
- Pentest Tools Url Fuzzer
- Pentest Tools Online
- Hacker Techniques Tools And Incident Handling
- Pentest Reporting Tools
- Hack Tools
- Nsa Hack Tools Download
- Hacker Tools List
- Hacking Tools 2019
- How To Make Hacking Tools
- Hack Tools 2019
- Hackers Toolbox
- How To Hack
- Hack Tools Mac
- Hacking Tools For Mac
- Pentest Tools Windows
- Hacking Tools And Software
- Hack Tools Mac
- How To Install Pentest Tools In Ubuntu
- How To Hack
- Hacker Tools For Pc
- Beginner Hacker Tools
- New Hacker Tools
- Pentest Tools Alternative
- Hacking Tools And Software
- Pentest Tools Download
- What Is Hacking Tools
- Hack Tools For Games
- Hacking Tools Online
- Pentest Tools List
- Pentest Tools Download
- Hacking Apps
- Hack Tools Pc
- Pentest Box Tools Download
- Hacker Tools List
- Pentest Tools Bluekeep
- What Are Hacking Tools
- Nsa Hack Tools Download
- Black Hat Hacker Tools
- Hacking Tools Github
- Pentest Reporting Tools
- Hacking Tools Windows 10

Nenhum comentário:
Postar um comentário