401 Reading 31 - marsecguy/reading-notes-cyberops GitHub Wiki
YARA Rules
-
What is the main goal of Threat Hunting and how is it different from traditional threat monitoring?
- Threat hunting is a method of searching for malicious code that is already in your system or network. It is a proactive approach that seeks to find existing threats, rather than a passive approach, such as threat monitoring, which "listens" for potential threats coming in.
-
What are the four types of YARA rules and what does each one of them use to identify and classify malicious software?
- String-based rules listen for stings known to be in the malware.
- File-metadata rules look for information within the metadata of the files.
- Hash-based rules use hash cryptography to search for files that have been altered, possibly by injection of malware.
- Network-based rules look at traffic data, such as searching for a piece of malware known to target specific ports.
-
How are YARA rules similar to how Anti-Virus programs detect malicious software?
- YARA and antivirus software both use pattern matching to try detect malware
- They both search for viruses, trojans, worms, and other types of malware.
- They both inspect files and their attributes in their search
Sources: Archer, Geeks for Geeks