Tuesday, August 25, 2020

Yeti - Your Everyday Threat Intelligence


Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. Yeti will also automatically enrich observables (e.g. resolve domains, geolocate IPs) so that you don't have to. Yeti provides an interface for humans (shiny Bootstrap-based UI) and one for machines (web API) so that your other tools can talk nicely to it.
Yeti was born out of frustration of having to answer the question "where have I seen this artifact before?" or Googling shady domains to tie them to a malware family.
In a nutshell, Yeti allows you to:
  • Submit observables and get a pretty good guess on the nature of the threat.
  • Inversely, focus on a threat and quickly list all TTPs, Observables, and associated malware.
  • Let responders skip the "Google the artifact" stage of incident response.
  • Let analysts focus on adding intelligence rather than worrying about machine-readable export formats.
  • Visualize relationship graphs between different threats.
This is done by:
  • Collecting and processing observables from a wide array of different sources (MISP instances, malware trackers, XML feeds, JSON feeds...)
  • Providing a web API to automate queries (think incident management platform) and enrichment (think malware sandbox).
  • Export the data in user-defined formats so that they can be ingested by third-party applications (think blocklists, SIEM).

Installation
There's are a few handy bootstrap scripts in /extras that you can use to install a production instance of Yeti.
If you're really in a hurry, you can curl | bash them.
$ curl https://raw.githubusercontent.com/yeti-platform/yeti/master/extras/ubuntu_bootstrap.sh | sudo /bin/bash
Please refer to the full documentation for more detailed steps.

Docker images
Yeti has a docker-compose script to get up and running even faster; this is useful for testing or even running production instances of Yeti should your infrastructure support it. Full instructions here, but in a nutshell:
$ git clone https://github.com/yeti-platform/yeti.git
$ cd yeti/extras/docker/dev
$ docker-compose up

Useful links




via KitPloitRelated word
  1. Hacking Tools For Beginners
  2. Hacking Tools Github
  3. Pentest Tools Linux
  4. Wifi Hacker Tools For Windows
  5. Pentest Tools Port Scanner
  6. Pentest Tools Free
  7. Pentest Tools Nmap
  8. Pentest Tools Online
  9. Hacker Tools For Windows
  10. Hacker Tools Free Download
  11. Hack Tools Online
  12. Pentest Tools
  13. Ethical Hacker Tools
  14. Hacking Tools For Windows
  15. What Are Hacking Tools
  16. Pentest Tools Nmap
  17. Hacker Tools Hardware
  18. Usb Pentest Tools
  19. Pentest Tools Find Subdomains
  20. Hack Tools For Mac
  21. Pentest Tools For Windows
  22. Hacking Tools Free Download
  23. Hacker Tools Hardware
  24. Hack Tools
  25. Hack Rom Tools
  26. Hack Tools
  27. Hacking Tools Online
  28. Hack Tools Github
  29. Hacker Tools Free
  30. Hackrf Tools
  31. Hack Tools Github
  32. Wifi Hacker Tools For Windows
  33. Physical Pentest Tools
  34. Top Pentest Tools
  35. Pentest Tools Bluekeep
  36. Free Pentest Tools For Windows
  37. Pentest Tools Tcp Port Scanner
  38. Usb Pentest Tools
  39. Hacker
  40. Github Hacking Tools
  41. Pentest Reporting Tools
  42. How To Make Hacking Tools
  43. Top Pentest Tools
  44. Easy Hack Tools
  45. World No 1 Hacker Software
  46. Hacking Tools Windows 10
  47. Hacker Tools For Windows
  48. Install Pentest Tools Ubuntu
  49. Hacking Tools Free Download
  50. Termux Hacking Tools 2019
  51. Pentest Tools Review
  52. Hacking Tools Usb
  53. Hacking Tools For Kali Linux
  54. Hack Tools Github
  55. Hacker Tools List
  56. Hacking Tools Github
  57. Pentest Tools Linux
  58. Hacking Tools Software
  59. Pentest Tools Open Source
  60. Hack Apps
  61. Free Pentest Tools For Windows
  62. Hacker Tools Free Download
  63. Hack Tools
  64. Hack Tools 2019
  65. Black Hat Hacker Tools
  66. Hacker Tools For Pc
  67. Pentest Tools List
  68. Hacking Tools Download
  69. Beginner Hacker Tools
  70. Pentest Tools For Mac
  71. Physical Pentest Tools
  72. Hacking Tools 2019
  73. Usb Pentest Tools
  74. Pentest Tools Github
  75. Hacker Search Tools
  76. Best Hacking Tools 2020
  77. How To Hack
  78. Ethical Hacker Tools
  79. Hacking Tools Software
  80. Hack Apps
  81. Hacking Tools For Windows Free Download
  82. Hacker Tools For Pc
  83. Pentest Tools For Android
  84. Hack Tools Mac
  85. Pentest Recon Tools
  86. Pentest Tools Url Fuzzer
  87. Pentest Tools For Mac
  88. Pentest Tools Github
  89. Pentest Tools Find Subdomains
  90. Hacking Tools Kit
  91. Github Hacking Tools
  92. Hacker Tools Linux
  93. Hacker Tools 2019
  94. Pentest Tools Apk
  95. Pentest Tools For Ubuntu
  96. Bluetooth Hacking Tools Kali
  97. Underground Hacker Sites
  98. Pentest Tools Linux
  99. Hacker Tools Free Download
  100. Hacking Tools Online
  101. Pentest Tools Website Vulnerability
  102. Termux Hacking Tools 2019
  103. Hacking Tools Online
  104. Hacking Tools
  105. New Hack Tools
  106. Hacking Tools
  107. Hack App
  108. Hack Tool Apk
  109. Hacker Tools For Ios
  110. Hacking Tools For Windows
  111. Pentest Tools Online
  112. Hak5 Tools
  113. What Is Hacking Tools
  114. Hacker Tools For Ios
  115. Hack Tools
  116. Hack Tools Download
  117. Hacking Tools Github
  118. Black Hat Hacker Tools
  119. Hack Tools For Ubuntu
  120. Hack And Tools
  121. Pentest Tools Review
  122. Kik Hack Tools
  123. Kik Hack Tools
  124. Top Pentest Tools
  125. Hacker Hardware Tools
  126. Hack Tool Apk
  127. Hack Rom Tools
  128. Hacker Security Tools
  129. Underground Hacker Sites
  130. Hacker Tools For Mac
  131. Hacking Tools Download
  132. Hack Website Online Tool
  133. Pentest Automation Tools
  134. Pentest Tools Find Subdomains
  135. Wifi Hacker Tools For Windows
  136. Hacking Tools Software

No comments:

Post a Comment

All comments are welcome, but if you choose to comment using the "anonymous" button, please be sure to include your name at the end. All TRULY anonymous comments will be deleted. Thanks for your understanding...Blaine (aka 5KidMom)