<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Blacklist on Michael Edie</title><link>https://d427a9a8.blog-zbi.pages.dev/tags/blacklist/</link><description>Recent content in Blacklist on Michael Edie</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 30 Apr 2020 21:46:05 +0000</lastBuildDate><atom:link href="https://d427a9a8.blog-zbi.pages.dev/tags/blacklist/index.xml" rel="self" type="application/rss+xml"/><item><title>DIY IP Threat Feed</title><link>https://d427a9a8.blog-zbi.pages.dev/2020/04/30/diy-ip-threat-feed/</link><pubDate>Thu, 30 Apr 2020 21:46:05 +0000</pubDate><guid>https://d427a9a8.blog-zbi.pages.dev/2020/04/30/diy-ip-threat-feed/</guid><description>&lt;p&gt;A threat feed is a collection of actionable information about threats that allows for mitigating harmful events. This blog post is concerned with developing an IP based threat feed or blacklist. We will look at how to gather, aggregate, enrich, and extract threat data for consumption.&lt;/p&gt;
&lt;nav class="toc-a" aria-label="Table of Contents"&gt;
 &lt;div class="toc-a-head"&gt;
 &lt;span class="toc-a-chevron"&gt;&amp;gt;&lt;/span&gt;
 &lt;span class="toc-a-label"&gt;Table of Contents&lt;/span&gt;
 &lt;/div&gt;
 &lt;ul class="toc-a-list"&gt;
 &lt;li class="h2"&gt;
 &lt;a href="#gathering-the-threat-data" data-id="gathering-the-threat-data"&gt;01&amp;nbsp;&amp;nbsp;Gathering the threat data&lt;/a&gt;
 &lt;/li&gt;
 &lt;li class="h2"&gt;
 &lt;a href="#aggregation-of-the-threat-data" data-id="aggregation-of-the-threat-data"&gt;02&amp;nbsp;&amp;nbsp;Aggregation of the threat data&lt;/a&gt;
 &lt;/li&gt;
 &lt;li class="h2"&gt;
 &lt;a href="#data-enrichment" data-id="data-enrichment"&gt;03&amp;nbsp;&amp;nbsp;Data Enrichment&lt;/a&gt;
 &lt;/li&gt;
 &lt;li class="h2"&gt;
 &lt;a href="#extraction" data-id="extraction"&gt;04&amp;nbsp;&amp;nbsp;Extraction&lt;/a&gt;
 &lt;/li&gt;
 &lt;/ul&gt;
 &lt;div class="toc-a-progress"&gt;
 &lt;div class="toc-a-progress-fill"&gt;&lt;/div&gt;
 &lt;/div&gt;
&lt;/nav&gt;

&lt;h2 id="gathering-the-threat-data"&gt;Gathering the threat data&lt;/h2&gt;
&lt;p&gt;I have several servers in the US, Europe, and Asia running modified versions of &lt;a href="https://github.com/cowrie/cowrie"&gt;cowrie&lt;/a&gt;, a medium interaction honey pot. These honey pots allow ssh access by accepting logins based on a random number of guesses for each attacker. The configuration setting is below:&lt;/p&gt;</description></item></channel></rss>