Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. Yeti will also automatically enrich observables (e.g. resolve domains, geolocate IPs) so that you don't have to. Yeti provides an interface for humans (shiny Bootstrap-based UI) and one for machines (web API) so that your other tools can talk nicely to it.
Yeti was born out of frustration of having to answer the question "where have I seen this artifact before?" or Googling shady domains to tie them to a malware family.
In a nutshell, Yeti allows you to:
- Submit observables and get a pretty good guess on the nature of the threat.
- Inversely, focus on a threat and quickly list all TTPs, Observables, and associated malware.
- Let responders skip the "Google the artifact" stage of incident response.
- Let analysts focus on adding intelligence rather than worrying about machine-readable export formats.
- Visualize relationship graphs between different threats.
- Collecting and processing observables from a wide array of different sources (MISP instances, malware trackers, XML feeds, JSON feeds...)
- Providing a web API to automate queries (think incident management platform) and enrichment (think malware sandbox).
- Export the data in user-defined formats so that they can be ingested by third-party applications (think blocklists, SIEM).
Installation
There's are a few handy bootstrap scripts in /extras that you can use to install a production instance of Yeti.
If you're really in a hurry, you can
curl | bash
them.$ curl https://raw.githubusercontent.com/yeti-platform/yeti/master/extras/ubuntu_bootstrap.sh | sudo /bin/bash
Please refer to the full documentation for more detailed steps.Docker images
Yeti has a
docker-compose
script to get up and running even faster; this is useful for testing or even running production instances of Yeti should your infrastructure support it. Full instructions here, but in a nutshell:$ git clone https://github.com/yeti-platform/yeti.git
$ cd yeti/extras/docker/dev
$ docker-compose up
Useful links
via KitPloit
Related word
- Hacking Tools Usb
- Hacking Tools Usb
- Pentest Tools For Windows
- Hack Tools Pc
- Wifi Hacker Tools For Windows
- Hacking Tools Name
- Nsa Hack Tools Download
- Hacking Tools For Pc
- Hacker Tools Github
- Hacking Tools Windows
- Hack Tools For Games
- Hacking Tools Kit
- Hacking Apps
- Hacker Tools 2020
- Pentest Tools Android
- Hack Tools 2019
- Growth Hacker Tools
- Kik Hack Tools
- Hacker Tools Free
- Hacker Tools Github
- Hack And Tools
- Hacker Tools Free Download
- Hacking Tools Download
- How To Hack
- Hacker Tools Windows
- Pentest Tools Website
- Nsa Hacker Tools
- Hacker Tools 2019
- Hacker Tools Linux
- Hacker Tools
- Hacker Tools Apk
- Hacking Tools Name
- Pentest Tools Find Subdomains
- Hacking App
- Hack Tools
- Hacker Tools Software
- Hack Tools Pc
- Hackrf Tools
- Hacker Tools For Ios
- Termux Hacking Tools 2019
- Pentest Tools Review
- Hacking Tools And Software
- Pentest Tools Website
- Hacker Tools For Mac
- Hacking Tools
- Hacking Tools For Pc
- Hacker Security Tools
- Pentest Tools For Ubuntu
- Best Hacking Tools 2020
- New Hack Tools
- Kik Hack Tools
- Hacker Tools Free
- Pentest Tools Apk
- Hacking Tools For Beginners
- Beginner Hacker Tools
- Pentest Tools Subdomain
- Hacking Tools For Games
- Hacking Tools For Beginners
- Pentest Tools Online
- Android Hack Tools Github
- Hackrf Tools
- Hacker Tools For Ios
- Best Hacking Tools 2020
- Physical Pentest Tools
- Hack Tools For Pc
- Pentest Tools Github
- Pentest Tools Free
- Hacker Tools Free Download
- Hack Tools 2019
- Hacker Tools Apk Download
- World No 1 Hacker Software
- Pentest Tools Free
0 comments:
Post a Comment