In your environment, you deal with threats from all over the world. Many groups out there pool resources to help everyone deal with those #threats. Some come in the form of threat #intelligence from various intelligence companies, like #Carbon #Black, #FireEye, and #Crowdstrike.
But what if your company cannot afford such products, or are not ready to engage those types of companies, and still need need protections? Never fear, there are open source options available (see show notes below). These products aren't perfect, but they will provide a modicum of protection from 'known' bad actors, SSH trolls, etc.
We discuss some of the issues using them, discuss how to use them in your #environment.
Lastly, we discuss #mentorship. Having a good mentor/mentee relationship can be mutally beneficial to both parties. We discuss what it takes to be a good mentee, as well as a good mentor...
RSS: www.brakeingsecurity.com/rss
Direct Download: http://traffic.libsyn.com/brakeingsecurity/2017-002-mentoring_threat_lists.mp3
iTunes:
YouTube:
----------
HITB announcement:
“Tickets are on sale, And entering special code 'brakeingsecurity' at checkout gets you a 10% discount". Brakeing Down Security thanks #Sebastian Paul #Avarvarei and all the organizers of #Hack In The Box (#HITB) for this opportunity! You can follow them on Twitter @HITBSecConf. Hack In the Box will be held from 10-14 April 2017. Find out more information here: http://conference.hitb.org/hitbsecconf2017ams/
---------
Join our #Slack Channel! Sign up at https://brakesec.signup.team
#RSS: http://www.brakeingsecurity.com/rss
#Google Play Store: https://play.google.com/music/m/Ifp5boyverbo4yywxnbydtzljcy?t=Brakeing_Down_Security_podcast
#SoundCloud: https://www.soundcloud.com/bryan-brake
Comments, Questions, Feedback, or Suggestions? Contact us via Email: bds.podcast@gmail.com
#Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir
#Facebook: https://www.facebook.com/BrakeingDownSec/
#Tumblr: http://brakeingdownsecurity.tumblr.com/
#Player.FM : https://player.fm/series/brakeing-down-security-podcast
#Stitcher Network: http://www.stitcher.com/s?fid=80546&refid=stpr
#TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582
----------
Show Notes:
HANGOUTS: https://hangouts.google.com/call/w7rkkde5yrew5nm4n7bfw4wfjme
2017-002-Threat Lists, IDS/IPS rulesets, and infosec mentoring
- Threat Lists (didn’t have much time to research :/)
-
- THIS EXACTLY - http://blogs.gartner.com/anton-chuvakin/2014/01/28/threat-intelligence-is-not-signatures/
-
- Don’t use threat list feeds (by IP/domain) as threat intelligence
- Can use them for aggressively blocking, don’t use for alerting
- https://isc.sans.edu/suspicious_domains.html
- https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt
- http://iplists.firehol.org/
- https://zeltser.com/malicious-ip-blocklists/
- https://medium.com/@markarenaau/actionable-intelligence-is-it-a-capability-problem-or-does-your-intelligence-provider-suck-d8d38b1cbd25#.ncpmqp9cx
- Spamhaus: https://www.spamhaus.org/
- leachers
- Open rulesets - You can always depend on the kindness of strangers
- Advantage is that these are created by companies that have worldwide reach
- Updated daily
- Good accompanying documentation
- You can buy large rulesets to use in your own IDS implementation
- Depends on your situation if you want to go managed or do yourself
- Regardless you need to test them
- Managed security services will do this for you
- I don’t recommend unless you have a team of dedicated people or you don’t care about getting hacked- signatures are way too dynamic, like trying to do AV sigs all by yourself
- Only a good idea for one-off, targeted attacks
- DIY
- IDS/IPS rulesets
- https://securityintelligence.com/signature-based-detection-with-yara/
- http://yararules.com/
- http://resources.infosecinstitute.com/yara-simple-effective-way-dissecting-malware/
- Yara rules
- For Mentors
-
- Set expectations & boundaries
- Find a good fit
- Be an active listener
- Keep open communication
- Schedule time
- Create homework
- Don’t assume technical level
- Ask questions
- Do your own research
- Find a good fit
- Put forth effort
- It’s not the Mentor’s job to handhold, take responsibility for own learning
- Value their time
- Come to each meeting with an agenda
- For Mentees
- Mentoring frameworks?
- InfoSec Mentoring
- Podcasts
No comments:
Post a Comment