Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. Yeti will also automatically enrich observables (e.g. resolve domains, geolocate IPs) so that you don't have to. Yeti provides an interface for humans (shiny Bootstrap-based UI) and one for machines (web API) so that your other tools can talk nicely to it.
Yeti was born out of frustration of having to answer the question "where have I seen this artifact before?" or Googling shady domains to tie them to a malware family.
In a nutshell, Yeti allows you to:
- Submit observables and get a pretty good guess on the nature of the threat.
- Inversely, focus on a threat and quickly list all TTPs, Observables, and associated malware.
- Let responders skip the "Google the artifact" stage of incident response.
- Let analysts focus on adding intelligence rather than worrying about machine-readable export formats.
- Visualize relationship graphs between different threats.
- Collecting and processing observables from a wide array of different sources (MISP instances, malware trackers, XML feeds, JSON feeds...)
- Providing a web API to automate queries (think incident management platform) and enrichment (think malware sandbox).
- Export the data in user-defined formats so that they can be ingested by third-party applications (think blocklists, SIEM).
Installation
There's are a few handy bootstrap scripts in /extras that you can use to install a production instance of Yeti.
If you're really in a hurry, you can
curl | bash
them.$ curl https://raw.githubusercontent.com/yeti-platform/yeti/master/extras/ubuntu_bootstrap.sh | sudo /bin/bash
Please refer to the full documentation for more detailed steps.Docker images
Yeti has a
docker-compose
script to get up and running even faster; this is useful for testing or even running production instances of Yeti should your infrastructure support it. Full instructions here, but in a nutshell:$ git clone https://github.com/yeti-platform/yeti.git
$ cd yeti/extras/docker/dev
$ docker-compose up
Useful links
via KitPloit Related articles
- Best Hacking Tools 2019
- Hacking Tools For Mac
- Pentest Automation Tools
- Beginner Hacker Tools
- Hacking Tools Download
- Hacker Tools List
- Hackrf Tools
- Hacking Tools Online
- Hacking Tools For Beginners
- Best Pentesting Tools 2018
- Hacking Tools Name
- Pentest Tools Android
- New Hack Tools
- Hacking Tools For Mac
- Hacker Hardware Tools
- What Is Hacking Tools
- Hacking Tools Name
- What Is Hacking Tools
- Hacker Tool Kit
- Hak5 Tools
- Hacker Search Tools
- Pentest Automation Tools
- Best Pentesting Tools 2018
- Pentest Tools Framework
- Hacking Tools Pc
- Hacking Tools For Games
- Hacker Tools Apk Download
- Pentest Tools For Ubuntu
- New Hacker Tools
- New Hacker Tools
- Wifi Hacker Tools For Windows
- Pentest Tools Bluekeep
- Hacking Tools Name
- Hack Tool Apk No Root
- Pentest Box Tools Download
- Hack Tool Apk No Root
- Hack And Tools
- Hack Tools For Mac
- Pentest Box Tools Download
- Hack Rom Tools
- Pentest Tools Linux
- How To Make Hacking Tools
- Hacking Tools And Software
- Pentest Tools Linux
- Hacker Tools Apk
- Hack Tools
- Hacking Tools Windows
- Nsa Hack Tools Download
- Hackers Toolbox
- Hacker Tools Apk
- Best Hacking Tools 2019
- Pentest Tools For Windows
- Hack Rom Tools
- Hack Tools For Ubuntu
- Hack And Tools
- Hacking Tools Name
- Hacking Tools And Software
- Hacker Tools For Ios
- Pentest Tools For Mac
- Hacking Tools Hardware
- Pentest Tools Download
- Hacker Tools 2020
- Pentest Recon Tools
- Bluetooth Hacking Tools Kali
- Hacker Tools Linux
- Pentest Tools Subdomain
- Bluetooth Hacking Tools Kali
- Hacking Tools For Beginners
- Hacker Tools List
- Pentest Tools Windows
- Hacker Tools Free
- Pentest Tools For Windows
- Pentest Tools Port Scanner
- Beginner Hacker Tools
- Free Pentest Tools For Windows
- Hacker Tools Windows
- Hack Tools Github
- Hacking Tools For Games
- New Hack Tools
- New Hacker Tools
- Hacker Tools For Pc
No hay comentarios.:
Publicar un comentario