Skip to content

Commit

Permalink
#1113 fix markdown and image links
Browse files Browse the repository at this point in the history
  • Loading branch information
jeromeleonard committed Jul 22, 2022
1 parent b6552af commit d4464bf
Showing 1 changed file with 8 additions and 8 deletions.
16 changes: 8 additions & 8 deletions analyzers/Vulners/README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Vulners-analyzer
### Vulners-analyzer

This analyzer consists of 2 parts.
1. **Vulners_IOC**: As a result of collaboration between Vulners and RST Threat Feed, the idea was to send IOC analysis results through theHive analyzer: blog post
Expand All @@ -7,25 +7,25 @@ This analyzer consists of 2 parts.

Vulners API key required.

## Setting up analyzer
#### Setting up analyzer

* copy the folders "Vulners" analyzer & "Vulners" into your Cortex analyzer path
* install necessary python modules from the requirements.txt (**pip install -r requirements.txt**)
* restart Cortex to initialize the new Responder "**systemctl restart cortex**"

Get your Vulners api key: ![Vulners API](assets/vulners_api.png)

Add your Vulners API in Cortex settings: ![API key in Cortex](assets/Cortex_settings.png)
Add your Vulners API in Cortex settings: ![API key in Cortex](assets/Cortex_settings.PNG)

## Add Observable type in TheHive
#### Add Observable type in TheHive

By default theHive does not have a "cve" type to be observables, so we have to add it to Administrator Settings:

![add observable](assets/theHive_add_cve.PNG)
![add observable](assets/theHive_add_cve.png)

## Run the Analyzer in TheHive
#### Run the Analyzer in TheHive

####Network IOCs:
##### Network IOCs:

Short template:

Expand All @@ -39,7 +39,7 @@ Long template:
![Long_IOC_threat_template](assets/ioc_with_malware_family.PNG)


####Vulnerabilities:
##### Vulnerabilities:

Short template:

Expand Down

0 comments on commit d4464bf

Please sign in to comment.