OpenCTI and MISP - Ingesting MISP Events Into Your OpenCTI Stack!

แชร์
ฝัง
  • เผยแพร่เมื่อ 1 ม.ค. 2025

ความคิดเห็น • 14

  • @shinohai5781
    @shinohai5781 2 ปีที่แล้ว +5

    Bless you for making all these videos. I've been trying to do this myself, but having videos for reference is VERY helpful for me!

  • @jytan740
    @jytan740 3 หลายเดือนก่อน

    do you suggest use MISP or OpenCTI

  • @Sniperrkr
    @Sniperrkr 2 ปีที่แล้ว +2

    you need more credit!! These videos are gold!!

  • @vimukthiperera4993
    @vimukthiperera4993 2 ปีที่แล้ว

    sir i connected misp to opencti but sir its progress is not woring but it indicate misp active to opencti. sir what can i do for that.

  • @yehabashaw7374
    @yehabashaw7374 ปีที่แล้ว

    Can we do the reverse: Ingesting OpenCTI Events Into MISP platform?

  • @nidhalchaabane3076
    @nidhalchaabane3076 2 ปีที่แล้ว

    Hello I have a question about installing opencti why we use docker and why we use manual installation.?

  • @marcing4287
    @marcing4287 5 หลายเดือนก่อน

    Will OpenCTI allow me to monitor any specified information and feeds from MISP ? For example, I want to monitor 5 specific IPs and 5 domains. If there will be a hit in the feeds, will it alert me ?

  • @dotcaodin
    @dotcaodin 2 ปีที่แล้ว

    Superb videos as usual!!

  • @RemreErkan
    @RemreErkan 2 ปีที่แล้ว

    Hello, I am considering using an external MISP that is not mine. It seems unreasonable to enter all the tags in the yaml file as I want to get all the information on the MISP. Since the MISP I will use does not belong to me, I cannot assign new tag (like in video) to the data.
    Is there a way to fetch all the information without affecting MISP?

    • @Mmpopsoft
      @Mmpopsoft ปีที่แล้ว

      Did you find a solution ?

    • @RemreErkan
      @RemreErkan ปีที่แล้ว +1

      @@Mmpopsoft I remember that I used misp api to get tags and exported them all. Then, added all of the tags to the yaml.

    • @Mmpopsoft
      @Mmpopsoft ปีที่แล้ว +1

      @@RemreErkan thanks for sharing 👍