Skip to content

McHughSecurity

  • Home
  • Blog
  • Security Operations
  • DFIR
    • Reverse Engineering
      • Dynamic Analysis
      • Static Analysis
  • Vuln. Mgmt
  • Intelligence
    • Open-Source Intelligence
    • Threat Intelligence
      • AIL Framework
      • MISP – Open Source Threat Intelligence Platform
      • OpenCTI
  • Threat Modelling
    • Attack Libraries
    • Attack Trees
    • Mitigating Techniques
    • SaaS Threat Modelling
    • Threat Models
    • Tools
    • Validating Threat Mitigations
  • Toggle search form
  • Building a MISP Threat Feed Aggregator Blog
  • Building a Cuckoo Malware Analysis Server Digital Forensics & Incident Response
  • External Analysis with VirusTotal Digital Forensics & Incident Response
  • OSINT for Threat Intelligence Blog
  • [Part 3] Building a Threat Integration and Testing Lab – Splunk Enterprise Build
  • Loading Windows Event Logs to Elasticsearch Digital Forensics & Incident Response
  • Threat hunting with Elasticsearch and Kibana (Part 1) Digital Forensics & Incident Response
  • [Part 1] Building a Threat Integration and Testing Lab Build

Post series: Malware Analysis with AssemblyLine

Building CCCS’ AssemblyLine for Static Analysis

Posted on July 12, 2021 By A.McHugh No Comments on Building CCCS’ AssemblyLine for Static Analysis

This is post 1 of 1 in the series “Malware Analysis with AssemblyLine” System Requirements For this build, I will be deploying AssemblyLine on my bare-metal hypervisor exposed to the Internet. This is not always a good idea, however, my build will be further hardened by additional controls which I will explain in subsequent articles…

Read More “Building CCCS’ AssemblyLine for Static Analysis” »

Static Analysis

Recent Posts

  • Auto-updating Ubuntu 20.04 in less than 2 minutes
  • Feeding Analysis Information Leak (AIL) Framework
  • An Introduction to Threat Intelligence
  • Deploying MISP on DigitalOcean or Vultr Cloud Hosting
  • Building CCCS’ AssemblyLine for Static Analysis

Search

Recent Posts

  • Auto-updating Ubuntu 20.04 in less than 2 minutes
  • Feeding Analysis Information Leak (AIL) Framework
  • An Introduction to Threat Intelligence
  • Deploying MISP on DigitalOcean or Vultr Cloud Hosting
  • Building CCCS’ AssemblyLine for Static Analysis

Archives

  • April 2022
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • September 2020
  • April 2020
  • March 2020
  • January 2020
  • May 2019
  • Building a parallel-analysis Cuckoo server Digital Forensics & Incident Response
  • Building Structured Threat Intelligence (STIX) from FBI notices MISP - Open Source Threat Intelligence Platform
  • Extracting RAM from VirtualBox session Digital Forensics & Incident Response
  • TraceLabs Missing Persons 11th of April 2020 Open-Source Intelligence
  • Hardening TheHive4 and Cortex for public deployment Build
  • Building a MISP Threat Feed Aggregator Blog
  • Using the Data Classification Taxonomies in MISP MISP - Open Source Threat Intelligence Platform
  • Using the workflow taxonomy in MISP MISP - Open Source Threat Intelligence Platform

Categories

  • AIL Framework
  • Blog
  • Build
  • Design
  • Digital Forensics & Incident Response
  • Frameworks
  • Intelligence
  • MISP – Open Source Threat Intelligence Platform
  • Open-Source Intelligence
  • Operate
  • Security Operations
  • Static Analysis
  • Threat Intelligence

Copyright © 2022 McHughSecurity.

Powered by PressBook News Dark theme