Skip to content

McHughSecurity

  • Home
  • Blog
  • Security Operations
  • DFIR
    • Reverse Engineering
      • Dynamic Analysis
      • Static Analysis
  • Vuln. Mgmt
  • Intelligence
    • Open-Source Intelligence
    • Threat Intelligence
      • AIL Framework
      • MISP – Open Source Threat Intelligence Platform
      • OpenCTI
  • Threat Modelling
    • Attack Libraries
    • Attack Trees
    • Mitigating Techniques
    • SaaS Threat Modelling
    • Threat Models
    • Tools
    • Validating Threat Mitigations
  • Toggle search form
  • Using MISP in an air-gapped environment Design
  • Extracting RAM from VirtualBox session Digital Forensics & Incident Response
  • An Introduction to Threat Intelligence Threat Intelligence
  • Hardening TheHive4 and Cortex for public deployment Build
  • OSINT for Threat Intelligence Blog
  • [Part 3] Building a Threat Integration and Testing Lab – Splunk Enterprise Build
  • [Part 1] Building a Threat Integration and Testing Lab Build
  • Deploying (and using) TheHive4 [Part 1] Build

Author: A.McHugh

Implementing Elastic Cloud and using Elastic Security

Posted on March 14, 2021 By A.McHugh No Comments on Implementing Elastic Cloud and using Elastic Security

Whilst I am a big fan of free open source solutions, I am going to bend my preference here a bit for the Elastic Cloud solution functioning as a SIEM.

Read More “Implementing Elastic Cloud and using Elastic Security” »

Build

Building TheHive4 (4.0.5) and configuring MISP, Cortex and Webhooks.

Posted on March 3, 2021 By A.McHugh 10 Comments on Building TheHive4 (4.0.5) and configuring MISP, Cortex and Webhooks.
  1. Deploying (and using) TheHive4 [Part 1]
  2. Building TheHive4 (4.0.5) and configuring MISP, Cortex and Webhooks.
  3. Building the Assemblyline Analyzer for TheHive’s Cortex.
  4. TheHive 4.1.0 Deployment and Integration with MISP

Since the last write up I published on TheHive, there have been some significant changes and updates to TheHive. So for this post I will be walking through the installation and deployment of TheHive4 (4.0.5) and the connection to MISP, Cortex and enabling Webhooks.

Read More “Building TheHive4 (4.0.5) and configuring MISP, Cortex and Webhooks.” »

Digital Forensics & Incident Response

Building a parallel-analysis Cuckoo server

Posted on February 27, 2021 By A.McHugh No Comments on Building a parallel-analysis Cuckoo server

Cuckoo’s dynamic malware analysis platform is pretty good out of the box. But how can we scale it to allow parallel processing of samples, particuarly where Cuckoo is part of a process driven analysis workflow? In this article we discuss parallel processing for Cuckoo with 5x Windows 7 VMs.

Digital Forensics & Incident Response

Cuckoo Dynamic Malware Analysis

Posted on February 22, 2021 By A.McHugh 1 Comment on Cuckoo Dynamic Malware Analysis

Cuckoo is an automated dynamic malware analysis platform which allows for the analysis of submitted artefacts within a range of custom configured guest operating systems.

Analysis environments may be created for Windows, Linux, MacOS and Android, with all manner of filetypes able to be analyzed through the Cuckoo platform. Including, executables, office documents, pdf files, emails, and even hands-on execution of malware with network connections able to be routed through Tor.

Read More “Cuckoo Dynamic Malware Analysis” »

Digital Forensics & Incident Response

External Analysis with VirusTotal

Posted on February 21, 2021 By A.McHugh 1 Comment on External Analysis with VirusTotal

VirusTotal is a subsidiary of Alphabet Inc. (which is also the parent company of Google). The service offers static and dynamic artefact analysis through a combination of free and paid tiers of access, as well as access to broader intelligence harvested from submissions and their own honeypots.

The Virustotal service is quite popular amongst the Information Security profession in performing quick analysis of artefacts, however there are some drawbacks and other aspects to consider before implementing VirusTotal as part of your DFIR stack of tools.

Read More “External Analysis with VirusTotal” »

Digital Forensics & Incident Response

Using MISP in a TraceLabs Missing Persons engagement

Posted on February 14, 2021 By A.McHugh No Comments on Using MISP in a TraceLabs Missing Persons engagement

MISP is certainly intended to be used like this, however, with some creativity and some technical effort, the MISP Threat Intelligence Platform could be utilized as a missing person’s intelligence database.

In this post, I will discuss a methodology in using MISP as the Intelligence Platform, and more traditional applications such as Maltego (and some custom transforms) to collect, enrich, and manage your intelligence.

Read More “Using MISP in a TraceLabs Missing Persons engagement” »

Blog, MISP - Open Source Threat Intelligence Platform

Exporting Maltego Graphs to MISP

Posted on January 17, 2021 By A.McHugh 1 Comment on Exporting Maltego Graphs to MISP

Lately I have been playing with having MISP be the Intelligence Sharing platform for a number of business intelligence functions. However, the main issue with MISP (from a user’s perspective) is the interface, and how a less technical person would generate information for the platform.

This is where pairing MISP and Maltego together goes really well, and even results in less technical people being able to generate technical data for incorporation into intelligence operations.

Read More “Exporting Maltego Graphs to MISP” »

Intelligence

What is Cyber Threat Intelligence?

Posted on September 5, 2020 By A.McHugh No Comments on What is Cyber Threat Intelligence?

Intelligence is the enrichment of data or information, its classification and publication by experts within a field. The resultant output is ordinarily a qualitative assessment backed by quantitative metrics, or absolutes which formed part of the data or information it was derived from.

In terms of Cyber Threat Intelligence, this goes beyond the extraction of IOCs, strings, and the generation of cryptographic hashes, and fuzzy hashing – this is the correlation of events, actors, methods, and motives to generate Threat Intelligence which aims to describe the objectives, motives, capability and perhaps the identity of a threat actor.

Read More “What is Cyber Threat Intelligence?” »

Blog

Building a MISP Threat Feed Aggregator

Posted on September 5, 2020 By A.McHugh 1 Comment on Building a MISP Threat Feed Aggregator

Over the last few months I have been working away on several work tasks which have had me hunting for threats within an immensely complex environment. Part of this hunt has involved the analysis and selection of threat feeds for incorporation into other tools to hunt known bad indicators. In this post I will be talking through the deployment of MISP to enable aggregation of threat indicators, and the generation of exports which may be ingested into other platforms.

Read More “Building a MISP Threat Feed Aggregator” »

Blog

TraceLabs Missing Persons 11th of April 2020

Posted on April 12, 2020 By A.McHugh No Comments on TraceLabs Missing Persons 11th of April 2020

I have posted before on participating in other TraceLabs events (such as the Australian Federal Police Missing Persons Hackathon), so here goes a brief recounting of my experiences with a US missing persons event.

Read More “TraceLabs Missing Persons 11th of April 2020” »

Open-Source Intelligence

Posts navigation

Previous 1 2 3 4 Next

Recent Posts

  • Auto-updating Ubuntu 20.04 in less than 2 minutes
  • Feeding Analysis Information Leak (AIL) Framework
  • An Introduction to Threat Intelligence
  • Deploying MISP on DigitalOcean or Vultr Cloud Hosting
  • Building CCCS’ AssemblyLine for Static Analysis

Search

Recent Posts

  • Auto-updating Ubuntu 20.04 in less than 2 minutes
  • Feeding Analysis Information Leak (AIL) Framework
  • An Introduction to Threat Intelligence
  • Deploying MISP on DigitalOcean or Vultr Cloud Hosting
  • Building CCCS’ AssemblyLine for Static Analysis

Archives

  • April 2022
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • September 2020
  • April 2020
  • March 2020
  • January 2020
  • May 2019
  • Deploying MISP on DigitalOcean or Vultr Cloud Hosting Frameworks
  • An Introduction to Threat Intelligence Threat Intelligence
  • Using the workflow taxonomy in MISP MISP - Open Source Threat Intelligence Platform
  • [Part 4] Building a Threat Integration and Testing Lab – MISP Threat Intelligence Sharing Platform Build
  • OSINT for Threat Intelligence Blog
  • Using the Estimative Language Taxonomy in MISP MISP - Open Source Threat Intelligence Platform
  • Extracting RAM from VirtualBox session Digital Forensics & Incident Response
  • Using the Data Classification Taxonomies in MISP MISP - Open Source Threat Intelligence Platform

Categories

  • AIL Framework
  • Blog
  • Build
  • Design
  • Digital Forensics & Incident Response
  • Frameworks
  • Intelligence
  • MISP – Open Source Threat Intelligence Platform
  • Open-Source Intelligence
  • Operate
  • Security Operations
  • Static Analysis
  • Threat Intelligence

Copyright © 2022 McHughSecurity.

Powered by PressBook News Dark theme