Tuesday, August 25, 2020

Yeti - Your Everyday Threat Intelligence


Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. Yeti will also automatically enrich observables (e.g. resolve domains, geolocate IPs) so that you don't have to. Yeti provides an interface for humans (shiny Bootstrap-based UI) and one for machines (web API) so that your other tools can talk nicely to it.
Yeti was born out of frustration of having to answer the question "where have I seen this artifact before?" or Googling shady domains to tie them to a malware family.
In a nutshell, Yeti allows you to:
  • Submit observables and get a pretty good guess on the nature of the threat.
  • Inversely, focus on a threat and quickly list all TTPs, Observables, and associated malware.
  • Let responders skip the "Google the artifact" stage of incident response.
  • Let analysts focus on adding intelligence rather than worrying about machine-readable export formats.
  • Visualize relationship graphs between different threats.
This is done by:
  • Collecting and processing observables from a wide array of different sources (MISP instances, malware trackers, XML feeds, JSON feeds...)
  • Providing a web API to automate queries (think incident management platform) and enrichment (think malware sandbox).
  • Export the data in user-defined formats so that they can be ingested by third-party applications (think blocklists, SIEM).

Installation
There's are a few handy bootstrap scripts in /extras that you can use to install a production instance of Yeti.
If you're really in a hurry, you can curl | bash them.
$ curl https://raw.githubusercontent.com/yeti-platform/yeti/master/extras/ubuntu_bootstrap.sh | sudo /bin/bash
Please refer to the full documentation for more detailed steps.

Docker images
Yeti has a docker-compose script to get up and running even faster; this is useful for testing or even running production instances of Yeti should your infrastructure support it. Full instructions here, but in a nutshell:
$ git clone https://github.com/yeti-platform/yeti.git
$ cd yeti/extras/docker/dev
$ docker-compose up

Useful links




via KitPloit

Related news


  1. Hack Tools
  2. Hacker Tools Software
  3. Hack Website Online Tool
  4. Pentest Tools Windows
  5. Wifi Hacker Tools For Windows
  6. Hacking Tools For Mac
  7. Pentest Tools For Android
  8. Pentest Tools List
  9. Hacker Tools Windows
  10. Hacker Tools 2020
  11. Hacker Tools For Ios
  12. Pentest Tools Open Source
  13. Hacker Tools For Mac
  14. Hacking Tools Windows 10
  15. Hack Website Online Tool
  16. Ethical Hacker Tools
  17. Install Pentest Tools Ubuntu
  18. Pentest Tools Online
  19. Pentest Tools Open Source
  20. Pentest Tools Linux
  21. Hacker Tools For Windows
  22. Game Hacking
  23. Hackrf Tools
  24. Termux Hacking Tools 2019
  25. Hacking Tools For Windows Free Download
  26. Pentest Reporting Tools
  27. Best Hacking Tools 2020
  28. Hacking Tools For Kali Linux
  29. Hacking Apps
  30. Hackers Toolbox
  31. Game Hacking
  32. What Are Hacking Tools
  33. Black Hat Hacker Tools
  34. Game Hacking
  35. Hacker Security Tools
  36. Pentest Tools Website Vulnerability
  37. Hacking Tools For Windows Free Download
  38. Termux Hacking Tools 2019
  39. Pentest Tools Free
  40. Pentest Tools Alternative
  41. Hack Tools
  42. Beginner Hacker Tools
  43. Hack App
  44. Hacker Tools Linux
  45. Pentest Tools Online
  46. Pentest Tools Linux
  47. New Hacker Tools
  48. What Are Hacking Tools
  49. Hacking Tools Github
  50. Blackhat Hacker Tools
  51. Pentest Tools
  52. Pentest Tools Url Fuzzer
  53. Hacking Tools For Beginners
  54. Hacker Tools Software
  55. What Are Hacking Tools
  56. Hackrf Tools
  57. Hacker Tool Kit
  58. Hacking Tools For Kali Linux
  59. Kik Hack Tools
  60. Hack Website Online Tool
  61. Github Hacking Tools
  62. Pentest Tools Bluekeep
  63. Hacking Tools Github
  64. Pentest Tools Port Scanner
  65. Hack Tools For Mac
  66. Hacker Techniques Tools And Incident Handling
  67. Pentest Tools Android
  68. Pentest Tools Subdomain
  69. Pentest Tools Port Scanner
  70. Install Pentest Tools Ubuntu
  71. Hacking Tools Pc

No comments: