Saturday, March 19, 2016

Update - Hook Analyser Project

Readers,

On this post I'd like to share some of the updates on the next release of Hook Analyser project v3.4.

In the current state i.e. v3.3, Hook Analyser has got the two (2) key capabilities: Malware Analysis (static and dynamic) and (Open Source) Threat Intelligence (collection, correlation and visualisation).

I'd like to announce that one of my other projects - Incident Analyser will be ported into Hook Analyser as a module called "Probe Engine".

The Probe Engine performs AD enumeration to extract information about registered machines, privileged accounts-related details etc. Once the list of the machines is extracted, or a user-specified network range is provided, Probe engine will connect to each of the machine (credential will be required) and extract information such as external IPs where machines are connected with, processes hashes related information etc. This information will subsequently flow through the intelligence and malware analysis module for further analysis and investigation.

As you'd imagine, this is a major step in terms of the project maturity - and it may take some time. I'll try my best to release a working version as soon as possible.

At a high-level, the project will address following key use cases -
  • Breach detection through information collection and co-relation with open source intelligence
  • Basic and Advanced Malware Analysis
  • Security controls enrichment through collection and sharing of Indicators of Compromise (IOCs) 



Interested to see how community is utilising Hook Analyser? Following are some noteworthy mentions -

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.