Upload files to "Modules/Knowledge/SANS"

This commit is contained in:
2024-11-30 00:53:02 -05:00
parent 74c0aaafcf
commit fb30aeb51f
8 changed files with 302 additions and 0 deletions

View File

@ -0,0 +1,59 @@
def get_dfir_content():
return [
{
"title": "PICERL Framework",
"content": """
- Phases: Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned.
- Example: Containment using decoys or monitoring tools.
""",
"resources": [
"https://www.sans.org/",
"https://www.cisa.gov/"
]
},
{
"title": "Containment Challenges",
"content": """
- Rapid containment avoids losing critical intelligence.
- No containment leads to prolonged adversary presence (whack-a-mole).
""",
"resources": [
"https://www.ncsc.gov.uk/",
"https://attack.mitre.org/"
]
},
{
"title": "Hunt vs. Reactive Teams",
"content": """
- Reactive (Incident Response): Firefighting approach, putting out fires.
- Hunt Teams: Proactive, leveraging threat intelligence to predict and disrupt.
""",
"resources": [
"https://www.fireeye.com/",
"https://www.mandiant.com/"
]
},
{
"title": "Detection Engineering",
"content": """
- Focus on enabling actionable and collaborative processes.
- Outsource or automate repetitive tasks while maintaining oversight of critical alerts.
""",
"resources": [
"https://redcanary.com/",
"https://www.crowdstrike.com/"
]
},
{
"title": "Advanced Forensic Tools",
"content": """
- Volatility: Memory analysis.
- Splunk and Loggly: Advanced log analysis and monitoring.
- MFT Analysis: Tools like MFTECmd for NTFS evidence.
""",
"resources": [
"https://volatilityfoundation.org/",
"https://www.splunk.com/"
]
}
]