sigma
atomic-red-team
Our great sponsors
sigma | atomic-red-team | |
---|---|---|
41 | 32 | |
7,624 | 9,059 | |
3.4% | 3.2% | |
9.8 | 9.7 | |
1 day ago | 2 days ago | |
Python | C | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
sigma
-
Sigma rules in real life
Sigma rules https://github.com/SigmaHQ/sigma its value, I get it. Here’s a post https://www.linkedin.com/posts/nasreddinebencherchali_detection-blueteam-sigma-activity-7104868070069817344-mn91?utm_source=share&utm_medium=member_desktop detailing that 31 Sigma rules from the Sigma repository are triggering on different stages of the attack as described here https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/
-
Looking for feedback on a security-related project idea
Idea: A free and open-source web repository of Sigma detections where users can find, contribute, and suggest edits to detections. All user contributions will go through a StackExchange-style moderation queue. Built-in conversion from Sigma to the query language of your choice.
-
SOC SIEM Use Cases for First Internship
If you want more ideas/inspiration, or even just a starting point for baseline rule logic check out https://github.com/SigmaHQ/sigma https://github.com/SigmaHQ/sigma and look into the different rules folders there.
-
How do you actually threat hunt?
Agreed in general. But with stuff like SIGMA, I'd lean towards stuff should going into git. Better version control, your docs can be markdown and live right next to your threat library, you can strap on CI/CD (so you can deploy/run stuff as part of a pipeline). Confluence is a great start, but it doesn't scale well.
- Open Source SIEM Tools
-
Detection Engineering Source Websites
Have a look a sigma rules: https://github.com/SigmaHQ/sigma
- Scheduling query to look for whenever net group is ran.
- Scheduling querying that looks for anytime net group is ran.
-
3CX Customers suffering intrusions
Sigma: https://github.com/SigmaHQ/sigma/pull/4151/files Yara: https://github.com/Neo23x0/signature-base/blob/master/yara/gen\_mal\_3cx\_compromise\_mar23.yar source: https://twitter.com/cyb3rops/status/1641130326830333984?s=20
-
Any Suggestions On Creating A Detection Rule In Defender For CVE-2023-23397
I created a Defender Advanced Hunting query based of the Sigma rule https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_rundll32_webdav_client_susp_execution.yml
atomic-red-team
-
Which Antivirus do you recommend and why?
You can write your own or look at testing tools like Cytest to ensure that your business goals are met and to ensure your sensors are configured correctly, and ART for attack chains.
-
Exfiltration Detections
I had heard that Falcon Overwatch has a detection for Exfiltration for C2, but I was not able to trigger it using my personal Kali Machine to host a C2 server with https://github.com/cedowens/SimpleC2_Server and then used Atomic Red Team: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1041/T1041.md
- EDR Attack Simulation
-
Red Team Methodology
Yup what the above said, you can use atomic red https://github.com/redcanaryco/atomic-red-team
-
“Malicious” powershell commands for demo
Atomic red team have tests that should trigger it, it also has a clear description of what it does and how to clean up afterwards. https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1059.001/T1059.001.md suggest that you try obfuscation or cradle.
-
Initial acess simulation tests
Dated but still full of goodness. https://github.com/redcanaryco/atomic-red-team/tree/e88a1ea463964839e267dba74ec1cf7bf634ccbf/ARTifacts/Initial_Access
-
What are some good showcases of Collection-tactics of the MITRE ATT&CK matrix?
Are you familiar with Atomic Red Team? Many quick & practical sample tests you can often run without much effort or prep work. All tests map to Techniques - a quick way to search through them all at the Tactic level is by searching within the CSV index of all their current tests here (I counted ~50 Collection-related tests just now): https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Indexes/Indexes-CSV/index.csv
-
Testing an XDR solution
Check out Atomic Red Team’s Redcanary.
- Blue Teamers: What makes a good detection use case?
- Custom IOAs: What's The Best Resource/Documentation For This On CS Falcon
What are some alternatives?
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
detection-rules - Rules for Elastic Security's detection engine
sysmon-config - Sysmon configuration file template with default high-quality event tracing
BLUESPAWN - An Active Defense and EDR software to empower Blue Teams
wazuh-ruleset - Wazuh - Ruleset
sysmon-modular - A repository of sysmon configuration modules
velociraptor - Digging Deeper....
Incident-Playbook - GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
OpenSIEM-Logstash-Parsing - SIEM Logstash parsing for more than hundred technologies
public-pentesting-reports - A list of public penetration test reports published by several consulting firms and academic security groups.
Certified-Kubernetes-Security-Specialist - Curated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or making a pull request. All feedback for improvements are welcome. thank you.