Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Misp-Dashboard - A Dashboard For A Real-Time Overview Of Threat Intelligence From MISP Instances

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Misp-Dashboard - A Dashboard For A Real-Time Overview Of Threat Intelligence From MISP Instances


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


A dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The dashboard can be used as a real-time situational awareness tool to gather threat intelligence information. The misp-dashboard includes a gamification tool to show the contributions of each organisation and how they are ranked over time. The dashboard can be used for SOCs (Security Operation Centers), security teams or during cyber exercises to keep track of what is being processed on your various MISP instances.

Features

Live Dashboard
  • Possibility to subscribe to multiple ZMQ feeds from different MISP instances
  • Shows immediate contributions made by organisations
  • Displays live resolvable posted geo-locations


Geolocalisation Dashboard
  • Provides historical geolocalised information to support security teams, CSIRTs or SOCs in finding threats within their constituency
  • Possibility to get geospatial information from specific regions

Contributors Dashboard
Shows:
  • The monthly rank of all organisations
  • The last organisation that contributed (dynamic updates)
  • The contribution level of all organisations
  • Each category of contributions per organisation
  • The current ranking of the selected organisation (dynamic updates)
Includes:
  • Gamification of the platform:
    • Two different levels of ranking with unique icons
    • Exclusive obtainable badges for source code contributors and donator


Users Dashboard
  • Shows when and how the platform is used:
    • Login punchcard and contributions over time
    • Contribution vs login

Trendings Dashboard
  • Provides real time information to support security teams, CSIRTs or SOC showing current threats and activity
    • Shows most active events, categories and tags
    • Shows sightings and discussion overtime

Installation
Before installing, consider that the only supported system are open source Unix-like operating system such as Linux and others.
  • Launch ./install_dependencies.sh from the MISP-Dashboard directory (idempotent-ish)
  • Update the configuration file config.cfg so that it matches your system
    • Fields that you may change:
      • RedisGlobal -> host
      • RedisGlobal -> port
      • RedisGlobal -> zmq_url
      • RedisGlobal -> misp_web_url
      • RedisMap -> pathMaxMindDB

Updating by pulling
  • Re-launch ./install_dependencies.sh to fetch new required dependencies
  • Re-update your configuration file config.cfg by comparing eventual changes in config.cfg.default
Make sure no zmq python3 scripts are running. They block the update.
+ virtualenv -p python3 DASHENV
Already using interpreter /usr/bin/python3
Using base prefix '/usr'
New python executable in /home/steve/code/misp-dashboard/DASHENV/bin/python3
Traceback (most recent call last):
File "/usr/bin/virtualenv", line 9, in <module>
load_entry_point('virtualenv==15.0.1', 'console_scripts', 'virtualenv')()
File "/usr/lib/python3/dist-packages/virtualenv.py", line 719, in main
symlink=options.symlink)
File "/usr/lib/python3/dist-packages/virtualenv.py", line 942, in create_environment
site_packages=site_packages, clear=clear, symlink=symlink))
File "/usr/lib/python3/dist-packages/virtualenv.py", line 1261, in install_python
shutil.copyfile(executable, py_executable)
File "/usr/lib/python3.5/shutil.py", line 115, in copyfile
with open(dst, 'wb') as fdst:
OSError: [Errno 26] Text file busy: '/home/steve/code/misp-dashboard/DASHENV/bin/python3'
< /pre>
  • Restart the System: ./start_all.sh OR ./start_zmq.sh and ./server.py &

Starting the System
You should not run it as root. Normal privileges are fine.
  • Be sure to have a running redis server
    • e.g. redis-server --port 6250
  • Activate your virtualenv . ./DASHENV/bin/activate
  • Listen to the MISP feed by starting the zmq_subscriber ./zmq_subscriber.py &
  • Start the dispatcher to process received messages ./zmq_dispatcher.py &
  • Start the Flask server ./server.py &
  • Access the interface at http://localhost:8001/
Alternatively, you can run the start_all.sh script to run the commands described above.

Authentication
Authentication can be enable in config/config.cfg by setting auth_enabled = True. Users will be required to login to MISP and will be allowed to proceed if they have the User Setting's dashboard_access sets to 1 for the MISP user account.

Debug
Debug is fun and gives you more details on what is going on when things fail. Bare in mind running Flask in debug is NOT suitable for production, it will drop you to a Python shell if enabled, to do further digging.
Just before running ./server.py do:
export FLASK_DEBUG=1
export FLASK_APP=server.py
flask run --host=0.0.0.0 --port=8001 # <- Be careful here, this exposes it on ALL ip addresses. Ideally if run locally --host=127.0.0.1
OR, just toggle the debug flag in start_all.sh or config.cfg.
Happy hacking ;)

Restart from scratch
To restart from scratch and empty all data from your dashboard you can use the dedicated cleaning script clean.py
  Clean data stored in the redis server specified in the configuration file    optional arguments:    -h, --help    show this help message and exit    -b, --brutal  Perfom a FLUSHALL on the redis database. If not set, will use                  a soft method to delete only keys used by MISP-Dashboard.  

Notes about ZMQ
The misp-dashboard being stateless in regards to MISP, it can only process data that it received. Meaning that if your MISP is not publishing all notifications to its ZMQ, the misp-dashboard will not have them.
The most revelant example could be the user login punchcard. If your MISP doesn't have the option Plugin.ZeroMQ_audit_notifications_enable set to true, the punchcard will be empty.

Dashboard not showing results - No module named zmq
When the misp-dashboard does not show results then first check if the zmq module within MISP is properly installed.
In Administration, Plugin Settings, ZeroMQ check that Plugin.ZeroMQ_enable is set to True.
Publish a test event from MISP to ZMQ via Event Actions, Publish event to ZMQ.
Verify the logfiles

Clean data stored in the redis server specified in the configuration file

optional arguments:
-h, --help show this help message and exit
-b, --brutal Perfom a FLUSHALL on the redis database. If not set, will use
a soft method to delete only keys used by MISP-Dashboard.
If there's an error ModuleNotFoundError: No module named 'zmq' then install pyzmq.
${PATH_TO_MISP}/app/tmp/log/mispzmq.error.log
${PATH_TO_MISP}/app/tmp/log/mispzmq.log

zmq_subscriber options
  A zmq subscriber. It subscribe to a ZMQ then redispatch it to the MISP-dashboard    optional arguments:    -h, --help            show this help message and exit    -n ZMQNAME, --name ZMQNAME                          The ZMQ feed name    -u ZMQURL, --url ZMQURL                          The URL to connect to  

Deploy in production using mod_wsgi
Install Apache mod-wsgi for Python3
$SUDO_WWW ${PATH_TO_MISP}/venv/bin/pip install pyzmq
Caveat: If you already have mod-wsgi installed for Python2, it will be replaced!

A zmq subscriber. It subscribe to a ZMQ then redispatch it to the MISP-dashboard

optional arguments:
-h, --help show this help message and exit
-n ZMQNAME, --name ZMQNAME
The ZMQ feed name
-u ZMQURL, --url ZMQURL
The URL to connect to
Configuration file /etc/apache2/sites-available/misp-dashboard.conf assumes that misp-dashboard is cloned into /var/www/misp-dashboard. It runs as user misp in this example. Change the permissions to your custom folder and files accordingly.
sudo apt-get install libapache2-mod-wsgi-py3


...



๐Ÿ“Œ fediverse.network 2018 report, the number of instances in the fediverse grew from 2,756 instances to 4,340 (a 58% increase)


๐Ÿ“ˆ 31.4 Punkte

๐Ÿ“Œ MISP 2.4.82 app/webroot/js/misp.js sharingGroupPopulateOrganisations Cross Site Scripting


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Medium CVE-2019-12794: MISP MISP


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Medium CVE-2019-12868: MISP MISP


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ MISP 2.4.82 app/webroot/js/misp.js sharingGroupPopulateOrganisations cross site scripting


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ MISP 2.4.91 app/webroot/js/misp.js cross site scripting


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Low CVE-2020-10247: MISP MISP


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Low CVE-2020-10246: MISP MISP


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ MISP 2.4.91 app/webroot/js/misp.js Cross Site Scripting


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Low CVE-2020-11458: MISP MISP


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Medium CVE-2020-12889: MISP Misp-maltego


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Medium CVE-2020-12889: MISP Misp-maltego


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Low CVE-2020-13153: MISP MISP


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Low CVE-2021-3184: MISP MISP


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Low CVE-2021-25325: MISP MISP


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Low CVE-2021-25324: MISP MISP


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Medium CVE-2021-25323: MISP MISP


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Misp-Extractor - Tool That Connects To A MISP Instance And Retrieves Attributes Of Specific Types (Such As IP Addresses, URLs, And Hashes)


๐Ÿ“ˆ 30.34 Punkte

๐Ÿ“Œ Threat Intelligence: MISP Lab Setup


๐Ÿ“ˆ 29.48 Punkte

๐Ÿ“Œ Threat Stack supports AWS Graviton2-based instances through the Threat Stack Cloud Security Platform


๐Ÿ“ˆ 29.17 Punkte

๐Ÿ“Œ Was ist der Unterschied zwischen einem Threat Intelligence Anbieter und einer Threat Intelligence Plattform?


๐Ÿ“ˆ 28.62 Punkte

๐Ÿ“Œ Enhanced Threat Intelligence Portal Provides Consolidated Access to Kaspersky Threat Intelligence Expertise


๐Ÿ“ˆ 28.62 Punkte

๐Ÿ“Œ Future Intelligence=Human Intelligence(HI) + Artificial Intelligence(AI)


๐Ÿ“ˆ 22.72 Punkte

๐Ÿ“Œ RITA - Real Intelligence Threat Analytics


๐Ÿ“ˆ 22.32 Punkte

๐Ÿ“Œ MISP - Malware Information Sharing Platform and Threat Sharing


๐Ÿ“ˆ 21.9 Punkte

๐Ÿ“Œ From unstructured data to actionable intelligence: Using machine learning for threat intelligence


๐Ÿ“ˆ 21.88 Punkte

๐Ÿ“Œ Graduation Day: From Cyber Threat Intelligence to Intelligence


๐Ÿ“ˆ 21.88 Punkte

๐Ÿ“Œ Spamhaus Intelligence API: Free threat intelligence data for security developers


๐Ÿ“ˆ 21.88 Punkte

๐Ÿ“Œ Office of the Director of National Intelligence highlights cyber threats in 2023 Intelligence Threat Assessment


๐Ÿ“ˆ 21.88 Punkte

๐Ÿ“Œ VB2018 Threat Intelligence Summit: survey on threat intel usage


๐Ÿ“ˆ 21.05 Punkte

๐Ÿ“Œ 7/19/19 Can You Trust Threat Intelligence From Threat-Sharing Communities? | AT&T ThreatTraq


๐Ÿ“ˆ 21.05 Punkte

๐Ÿ“Œ Threat Detection, Risk Analytics, Threat Intelligence, Vulnerability Management - ESW #171


๐Ÿ“ˆ 21.05 Punkte

๐Ÿ“Œ Cybershare: Threat Intelligence โ€“ Part 3 Threat Hunting


๐Ÿ“ˆ 21.05 Punkte











matomo