تعتمد الادوات على المفاهيم التالية:
Sandboxing
Digital Forensics
Honeypots
Incident Response
Log Management and Analysis
SIEM
Endpoint Detection and Response
Network Security Monitoring
Threat detection
Network defense
Adversary Emulation
Sandboxing
Digital Forensics
Honeypots
Incident Response
Log Management and Analysis
SIEM
Endpoint Detection and Response
Network Security Monitoring
Threat detection
Network defense
Adversary Emulation
#Sandboxing:
Cuckoo Sandbox
Falcon Sandbox
Firejail
ANY RUN
Valkyrie Comodo
#Digital_Forensics:
ExifTool
Autopsy
Encrypted Disk Detector
HashMyFiles
USB Write Blocker
#Honeypots:
Kippo
Glastopf
ElasticHoney
Artillery
Cuckoo Sandbox
Falcon Sandbox
Firejail
ANY RUN
Valkyrie Comodo
#Digital_Forensics:
ExifTool
Autopsy
Encrypted Disk Detector
HashMyFiles
USB Write Blocker
#Honeypots:
Kippo
Glastopf
ElasticHoney
Artillery
#Incident_Response:
TheHive
GRR Rapid Response
MozDef
Cyphon
#Log_Management_and_Analysis:
Loggly
Fluentd
Sumo Logic
#SIEM:
OSSIM
Elastic Stack
SIEMonster
OSSEC
#Endpoint_Detection_and_Response:
Ettercap
Wazuh
EventTracker
TheHive
GRR Rapid Response
MozDef
Cyphon
#Log_Management_and_Analysis:
Loggly
Fluentd
Sumo Logic
#SIEM:
OSSIM
Elastic Stack
SIEMonster
OSSEC
#Endpoint_Detection_and_Response:
Ettercap
Wazuh
EventTracker
#Network_Security_Monitoring:
Zeek
Wireshark
RITA
Maltrail
#Threat_Detection:
Yara
HELK
#Network_Defense:
SNORT
pfSense
Fortinet Security Fabric
Wallarm
ModSecurity
CSF
Zeek
Wireshark
RITA
Maltrail
#Threat_Detection:
Yara
HELK
#Network_Defense:
SNORT
pfSense
Fortinet Security Fabric
Wallarm
ModSecurity
CSF
جاري تحميل الاقتراحات...