Brutkey

Christoffer S.
@nopatience@swecyb.com

I just published the source code for my very naive #Python implementation for generating a node network based on MITRE Intrusion Sets and Techniques. It will output linked #Markdown files linking intrusion sets to their used techniques.

Perhaps someone finds it useful or interesting to experiment with.

Source code:
https://github.com/cstromblad/markdown_node

I hinted at this in a thread started by
@Viss@mastodon.social where he asked for input on a few very likely malicious domains. Me @Viss@mastodon.social @cR0w@infosec.exchange @neurovagrant@masto.deoan.org and others did some OSINT fun work with a couple of the original domains.

It was this thread:
https://mastodon.social/@Viss/114145122623079635

Now I posted a picture of a node network rendered in Obsidian and I hinted that perhaps Obsidian could be used as a poor mans version of performing threat intelligence work.

#ThreatIntel #ThreatIntelligence #Cybersecurity #Obsidian