TheHive
sigma
Our great sponsors
TheHive | sigma | |
---|---|---|
24 | 41 | |
3,166 | 7,598 | |
2.3% | 3.1% | |
0.0 | 9.8 | |
over 1 year ago | 4 days ago | |
Scala | Python | |
GNU Affero General Public License v3.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
TheHive
-
What are your go-to tools for task management and/or case work?
I had a quick test with the hive looks pretty nice. https://thehive-project.org/
-
Taking Notes: What are your techniques as security professionals?
Also look into hive. Lots of people are moving that direction. https://thehive-project.org/
-
Free Tech Tools and Resources - Connection Tracing, Throttling Tool, Log Search & More
TheHive is a versatile open-source solution for streamlining the investigation and prompt handling of security incidents. Seamlessly integrates with MISP to facilitate the transition from event analysis to investigation initiation, enabling efficient synchronization and export for collaborative threat detection and response. Moreover, coupling TheHive with Cortex empowers security professionals to efficiently analyze up to hundreds of observables. Timely-Lychee-5204 describes it as, "an open-source and scalable Security Incident Response Platform designed for handling incidents efficiently."
-
Monthly Security Checklist
TheHive/Cortex - https://thehive-project.org/
- Does anyone have experience with self-hosted endpoint security solutions?
-
Software for recording security incidents?
i recommend TheHive for creating incident tickets. it is opensource but there is paid one offered by StrangeBee
-
Warning: Do not use Hive Social
Also unrelated to TheHive project, a security incident response tool.
https://thehive-project.org/
- New blue team
- 22 OSINT service for vulnerability detection that can be utilized in IT security.
-
Incident Response: What tool workflow do you use to collaborate on and document IR?
I haven't done any IR myself, but I was thinking something like TheHive Project (open source) or similar proprietary IR toolsets would be common. But over on r/blueteamsec I just saw this post, where people claimed to be using:
sigma
-
Sigma rules in real life
Sigma rules https://github.com/SigmaHQ/sigma its value, I get it. Here’s a post https://www.linkedin.com/posts/nasreddinebencherchali_detection-blueteam-sigma-activity-7104868070069817344-mn91?utm_source=share&utm_medium=member_desktop detailing that 31 Sigma rules from the Sigma repository are triggering on different stages of the attack as described here https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/
-
Looking for feedback on a security-related project idea
Idea: A free and open-source web repository of Sigma detections where users can find, contribute, and suggest edits to detections. All user contributions will go through a StackExchange-style moderation queue. Built-in conversion from Sigma to the query language of your choice.
-
SOC SIEM Use Cases for First Internship
If you want more ideas/inspiration, or even just a starting point for baseline rule logic check out https://github.com/SigmaHQ/sigma https://github.com/SigmaHQ/sigma and look into the different rules folders there.
-
How do you actually threat hunt?
Agreed in general. But with stuff like SIGMA, I'd lean towards stuff should going into git. Better version control, your docs can be markdown and live right next to your threat library, you can strap on CI/CD (so you can deploy/run stuff as part of a pipeline). Confluence is a great start, but it doesn't scale well.
- Open Source SIEM Tools
-
Detection Engineering Source Websites
Have a look a sigma rules: https://github.com/SigmaHQ/sigma
- Scheduling query to look for whenever net group is ran.
- Scheduling querying that looks for anytime net group is ran.
-
3CX Customers suffering intrusions
Sigma: https://github.com/SigmaHQ/sigma/pull/4151/files Yara: https://github.com/Neo23x0/signature-base/blob/master/yara/gen\_mal\_3cx\_compromise\_mar23.yar source: https://twitter.com/cyb3rops/status/1641130326830333984?s=20
-
Any Suggestions On Creating A Detection Rule In Defender For CVE-2023-23397
I created a Defender Advanced Hunting query based of the Sigma rule https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_rundll32_webdav_client_susp_execution.yml
What are some alternatives?
Aurora-Incident-Response - Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
velociraptor - Digging Deeper....
sysmon-config - Sysmon configuration file template with default high-quality event tracing
grr - GRR Rapid Response: remote live forensics for incident response
atomic-red-team - Small and highly portable detection tests based on MITRE's ATT&CK.
wazuh-ruleset - Wazuh - Ruleset
dislocker - FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX
Kuiper - Digital Forensics Investigation Platform
OpenSIEM-Logstash-Parsing - SIEM Logstash parsing for more than hundred technologies