PROGETA
Technologies
000
LAUNCHPAD → MODULES → TECHNICAL → #28 Offensive Security

Indicators of Compromise (IoC) Discovery

Creating detection rules based on attack evidence.

ABOUT THIS MODULE

What you will learn in this module.

Creating detection rules based on attack evidence. Writing YARA rules. Scanning systems for specific threat signatures.

OUTCOMES

What you will be able to do.

Writing YARA rules
Scanning systems for specific threat signatures
TOOLS & STACK

What you will work with.

YARA
Loki
MISP
MODULE INFO
TYPETechnical
CATEGORYOffensive Security
FORMATSelf-paced with live review