Introduction

Information Sharing and Analysis Centers (ISACs), are used to share and exchange various Indicators of Compromise (IOCs) to obtain threat intelligence. IOCs can include MD5s, IPs, YARA rules, and more. There are many ISACs that can be used to gather threat intelligence including AlienVault OTX, Threat Connect, and MISP.

Malware and IOCs used in this room have been sourced from The Zoo Malware Repositoryarrow-up-right. All credit goes to the respective owners.

Warning: This room uses neutered malware in a virtual environment, exercise caution when interacting with samples.

For future updates and rooms, follow @Cryillicarrow-up-right on Twitter.

Last updated