Offensive Security
Indicators of Compromise (IoC) Discovery
Creating detection rules based on attack evidence.
ABOUT THIS MODULE
What you will learn in this module.
Creating detection rules based on attack evidence. Writing YARA rules. Scanning systems for specific threat signatures.
OUTCOMES
What you will be able to do.
Writing YARA rules
Scanning systems for specific threat signatures
TOOLS & STACK
What you will work with.
YARA
Loki
MISP