[SANS ISC] Querying DShield from Cortex

I published the following diary on isc.sans.edu: “Querying DShield from Cortex”: Cortex is a tool part of the TheHive project. As stated on the website, it is a “Powerful Observable Analysis Engine”. Cortex can analyze observables like IP addresses, emails, hashes, filenames against a huge (and growing) list of online services.

[The post [SANS ISC] Querying DShield from Cortex has been first published on /dev/random]

Continue reading [SANS ISC] Querying DShield from Cortex

Imap2TheHive: Support for Custom Observables

I’m using OSSEC to feed an instance of TheHive to investigate security incidents reported by OSSEC. To better categorize the alerts and merge similar events, I needed to add more observables. OSSEC alerts are delivered by email with interesting information for TheHive. This was an interesting use case to play

[The post Imap2TheHive: Support for Custom Observables has been first published on /dev/random]

Continue reading Imap2TheHive: Support for Custom Observables

DShield Analyzer for Cortex

TheHive is an awesome tool to perform incident management. One of the software components that is linked to TheHive is Cortex defined as a “Powerful observable analysis engine“. Let’s me explain why Cortex can save you a lot of time. When you are working on an incident in TheHive, observables are

[The post DShield Analyzer for Cortex has been first published on /dev/random]

Continue reading DShield Analyzer for Cortex

Imap2TheHive: Support for Observables

I just published a new update of my imap2thehive tool. A quick reminder: this tool is aimed to poll an IMAP mailbox and feed an instance of TheHive with processed emails. This new version is now able to extract interesting IOCs from the email body and attached HTML files. The following indicators are

[The post Imap2TheHive: Support for Observables has been first published on /dev/random]

Continue reading Imap2TheHive: Support for Observables

[SANS ISC] The real value of an IOC?

I published the following diary on isc.sans.org: “The real value of an IOC?“: When a new malware sample is analysed by a security researcher, details are usually posted online with details of the behaviour and, based on this, a list of IOCs or “Indicators of Compromise” is published. Those indicators

[The post [SANS ISC] The real value of an IOC? has been first published on /dev/random]

Continue reading [SANS ISC] The real value of an IOC?

[SANS ISC] Automatic Hunting for Malicious Files Crossing your Network

I published the following diary on isc.sans.org: “Automatic Hunting for Malicious Files Crossing your Network“: If classic security controls remain mandatory (antivirus, IDS, etc), it is always useful to increase your capacity to detect suspicious activities occurring in your networks. Here is a quick recipe that I’m using to detect

[The post [SANS ISC] Automatic Hunting for Malicious Files Crossing your Network has been first published on /dev/random]

Continue reading [SANS ISC] Automatic Hunting for Malicious Files Crossing your Network

Imap2TheHive: Support of Attachments

I just published a quick update of my imap2thehive tool. Files attached to an email can now be processed and uploaded as an observable attached to a case. It is possible to specify which MIME types to process via the configuration file. The example below will process PDF & EML

[The post Imap2TheHive: Support of Attachments has been first published on /dev/random]

Continue reading Imap2TheHive: Support of Attachments

Feeding TheHive with Emails

TheHive is a great incident response platform which has the wind in its sails for a while. More and more organization are already using it or are strongly considering to deploy it in a near future. TheHive is tightly integrated with MISP to push/pull IOC’s. Such tool must be fed with

[The post Feeding TheHive with Emails has been first published on /dev/random]

Continue reading Feeding TheHive with Emails