terça-feira, 25 de agosto de 2020

Yeti - Your Everyday Threat Intelligence


Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. Yeti will also automatically enrich observables (e.g. resolve domains, geolocate IPs) so that you don't have to. Yeti provides an interface for humans (shiny Bootstrap-based UI) and one for machines (web API) so that your other tools can talk nicely to it.
Yeti was born out of frustration of having to answer the question "where have I seen this artifact before?" or Googling shady domains to tie them to a malware family.
In a nutshell, Yeti allows you to:
  • Submit observables and get a pretty good guess on the nature of the threat.
  • Inversely, focus on a threat and quickly list all TTPs, Observables, and associated malware.
  • Let responders skip the "Google the artifact" stage of incident response.
  • Let analysts focus on adding intelligence rather than worrying about machine-readable export formats.
  • Visualize relationship graphs between different threats.
This is done by:
  • Collecting and processing observables from a wide array of different sources (MISP instances, malware trackers, XML feeds, JSON feeds...)
  • Providing a web API to automate queries (think incident management platform) and enrichment (think malware sandbox).
  • Export the data in user-defined formats so that they can be ingested by third-party applications (think blocklists, SIEM).

Installation
There's are a few handy bootstrap scripts in /extras that you can use to install a production instance of Yeti.
If you're really in a hurry, you can curl | bash them.
$ curl https://raw.githubusercontent.com/yeti-platform/yeti/master/extras/ubuntu_bootstrap.sh | sudo /bin/bash
Please refer to the full documentation for more detailed steps.

Docker images
Yeti has a docker-compose script to get up and running even faster; this is useful for testing or even running production instances of Yeti should your infrastructure support it. Full instructions here, but in a nutshell:
$ git clone https://github.com/yeti-platform/yeti.git
$ cd yeti/extras/docker/dev
$ docker-compose up

Useful links




via KitPloit

Related word


  1. Bluetooth Hacking Tools Kali
  2. Hacking Tools Mac
  3. Hacking Tools For Games
  4. Pentest Tools Open Source
  5. Hack Apps
  6. Hacking Tools Windows 10
  7. Pentest Tools Find Subdomains
  8. Hack Tool Apk
  9. Hacking Apps
  10. Hack Tools 2019
  11. Best Hacking Tools 2019
  12. Hacking Tools For Kali Linux
  13. Tools 4 Hack
  14. Pentest Tools List
  15. Hack Tools
  16. Hacking Tools Software
  17. Hackers Toolbox
  18. Free Pentest Tools For Windows
  19. Best Hacking Tools 2020
  20. Black Hat Hacker Tools
  21. Hacker Tools Free Download
  22. Pentest Tools Url Fuzzer
  23. Pentest Tools Online
  24. Hacker Techniques Tools And Incident Handling
  25. Pentest Reporting Tools
  26. Hack Tools
  27. Nsa Hack Tools Download
  28. Hacker Tools List
  29. Hacking Tools 2019
  30. How To Make Hacking Tools
  31. Hack Tools 2019
  32. Hackers Toolbox
  33. How To Hack
  34. Hack Tools Mac
  35. Hacking Tools For Mac
  36. Pentest Tools Windows
  37. Hacking Tools And Software
  38. Hack Tools Mac
  39. How To Install Pentest Tools In Ubuntu
  40. How To Hack
  41. Hacker Tools For Pc
  42. Beginner Hacker Tools
  43. New Hacker Tools
  44. Pentest Tools Alternative
  45. Hacking Tools And Software
  46. Pentest Tools Download
  47. What Is Hacking Tools
  48. Hack Tools For Games
  49. Hacking Tools Online
  50. Pentest Tools List
  51. Pentest Tools Download
  52. Hacking Apps
  53. Hack Tools Pc
  54. Pentest Box Tools Download
  55. Hacker Tools List
  56. Pentest Tools Bluekeep
  57. What Are Hacking Tools
  58. Nsa Hack Tools Download
  59. Black Hat Hacker Tools
  60. Hacking Tools Github
  61. Pentest Reporting Tools
  62. Hacking Tools Windows 10

Nenhum comentário:

Postar um comentário