{"id":430,"date":"2024-08-22T08:56:46","date_gmt":"2024-08-22T08:56:46","guid":{"rendered":"https:\/\/yashinfosec.com\/?p=430"},"modified":"2024-08-22T08:56:46","modified_gmt":"2024-08-22T08:56:46","slug":"build-your-own-cyber-threat-intel-feeds-at-home-misp","status":"publish","type":"post","link":"https:\/\/yashinfosec.com\/?p=430","title":{"rendered":"Build Your Own Cyber Threat Intel Feeds at Home! (MISP)"},"content":{"rendered":"\n<p>Learn how to Collect Open Source Threat Intelligence<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>What is MISP?<\/p>\n\n\n\n<p id=\"ee41\">A threat intelligence platform for sharing, storing and correlating Indicators of Compromise of targeted attacks, threat intelligence, financial fraud information, vulnerability information or even counter-terrorism information. Discover how MISP is used today in multiple organisations. Not only to store, share, collaborate on cyber security indicators, malware analysis, but also to use the IOCs and information to detect and prevent attacks, frauds or threats against ICT infrastructures, organisations or people.<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img data-opt-id=1106015971  fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"394\" data-id=\"431\" src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:394\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png\" alt=\"\" class=\"wp-image-431\" srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:394\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:115\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:295\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:346\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:192\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1300\/h:500\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png 1300w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><strong><a href=\"https:\/\/www.misp-project.org\/features\/\" data-type=\"link\" data-id=\"https:\/\/www.misp-project.org\/features\/\">MISP<\/a><\/strong><\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/yashinfosec.com\/?p=430\/#Why_use_MISP\" >Why use MISP?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/yashinfosec.com\/?p=430\/#How_to_Install_MISP\" >How to Install MISP<\/a><ul class='ez-toc-list-level-5' ><li class='ez-toc-heading-level-5'><ul class='ez-toc-list-level-5' ><li class='ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/yashinfosec.com\/?p=430\/#Pre-requisites\" >Pre-requisites<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/yashinfosec.com\/?p=430\/#Step-by-Step_Guide\" >Step-by-Step Guide<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/yashinfosec.com\/?p=430\/#Now_lets_configure_MISP\" >Now let&#8217;s configure MISP<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/yashinfosec.com\/?p=430\/#Final_Thoughts\" >Final Thoughts<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h3 class=\"wp-block-heading\" id=\"313d\"><span class=\"ez-toc-section\" id=\"Why_use_MISP\"><\/span>Why use MISP?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p id=\"3880\">MISP is an excellent source of Open Source Intelligence (OSINT), which can be used in conjunction with other cybersecurity tools to enrich the threat detection capabilities to aid a security team. MISP can be used to feed IOCs to an SIEM, such as Wazuh, to aid in the detection of potentially risky domains, IP addresses and hashes, which can be used to trigger alerts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"bd6a\"><span class=\"ez-toc-section\" id=\"How_to_Install_MISP\"><\/span>How to Install MISP<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p id=\"7258\">There are several deployment configurations for MISP; I&#8217;ll be demonstrating how to do it using Docker, however, it does support native installation to <a href=\"https:\/\/misp.github.io\/MISP\/xINSTALL.ubuntu2204\" target=\"_blank\" rel=\"noreferrer noopener\">Ubuntu<\/a> as well. For demonstration purposes (and for home lab users), I&#8217;ll be using Docker. <strong>I would suggest Ubuntu for Production systems<\/strong>.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"1e93\"><span class=\"ez-toc-section\" id=\"Pre-requisites\"><\/span>Pre-requisites<span class=\"ez-toc-section-end\"><\/span><\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Linux server (Ubuntu\/Rocky)<\/li>\n\n\n\n<li>Docker Installed<\/li>\n\n\n\n<li>Git installed<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"3596\"><span class=\"ez-toc-section\" id=\"Step-by-Step_Guide\"><\/span>Step-by-Step Guide<span class=\"ez-toc-section-end\"><\/span><\/h5>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Connect to your Linux server<\/li>\n\n\n\n<li>use the below link to download the docker-compose file<\/li>\n<\/ol>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><a href=\"https:\/\/drive.google.com\/file\/d\/1caKj8vVnnScyX0qg5TBHaB9cU_ZHqiVO\/view?usp=sharing\">https:\/\/drive.google.com\/file\/d\/1caKj8vVnnScyX0qg5TBHaB9cU_ZHqiVO\/view?usp=sharing<\/a><\/p>\n<\/blockquote>\n\n\n\n<p>    3. Download and extract the rar file you can see the following files in the folder<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-opt-id=1321501456  fetchpriority=\"high\" decoding=\"async\" width=\"1018\" height=\"526\" src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image.png\" alt=\"\" class=\"wp-image-435\" srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1018\/h:526\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image.png 1018w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:155\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image.png 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:397\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image.png 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:465\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image.png 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:258\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image.png 500w\" sizes=\"(max-width: 1018px) 100vw, 1018px\" \/><\/figure>\n\n\n\n<p>     4. Now rename <em>template.env<\/em>  to <em>.env<\/em> and edit the file either using nano or Vi<\/p>\n\n\n\n<p>     5. Edit the following section replacing the email, org, password and base_url with your desired settings.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-opt-id=1643110989  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:325\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-3.png\"  decoding=\"async\" width=\"1024\" height=\"325\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20325%22%20width%3D%221024%22%20height%3D%22325%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22325%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-440\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:325\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-3.png 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:95\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-3.png 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:244\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-3.png 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:285\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-3.png 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:159\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-3.png 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1438\/h:456\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-3.png 1438w\" \/><\/figure>\n\n\n\n<p>       6. Pull the images<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>docker compose pull<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-opt-id=1562871647  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:310\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-4.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"310\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20310%22%20width%3D%221024%22%20height%3D%22310%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22310%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-443\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:310\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-4.png 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:91\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-4.png 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:232\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-4.png 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1536\/h:465\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-4.png 1536w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:272\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-4.png 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:151\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-4.png 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1917\/h:580\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-4.png 1917w\" \/><\/figure>\n\n\n\n<p>Note, that if you are running Portainer on this server, the MISP docker-compose file will appear as a stack. <strong>Note, that as this was built outside of Portainer, it will have limited control over the stack.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-opt-id=239218283  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:427\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-5.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"427\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20427%22%20width%3D%221024%22%20height%3D%22427%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22427%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-444\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:427\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-5.png 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:125\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-5.png 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:320\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-5.png 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1536\/h:641\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-5.png 1536w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:375\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-5.png 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:209\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-5.png 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1616\/h:674\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/image-5.png 1616w\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Now_lets_configure_MISP\"><\/span>Now let&#8217;s configure MISP<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Log in with the settings you configured earlier for email and password<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img data-opt-id=950696046  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_BQgJCEeX_Gr5QefSIiq_5A-1.webp\"  loading=\"lazy\" decoding=\"async\" width=\"585\" height=\"421\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-445\" style=\"width:565px;height:auto\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:585\/h:421\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_BQgJCEeX_Gr5QefSIiq_5A-1.webp 585w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:216\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_BQgJCEeX_Gr5QefSIiq_5A-1.webp 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:360\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_BQgJCEeX_Gr5QefSIiq_5A-1.webp 500w\" \/><\/figure>\n\n\n\n<p>2. Not much going on\u2026yet!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-opt-id=1300470631  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_w-YP7dxu0UXftfUO4LuF4g.webp\"  loading=\"lazy\" decoding=\"async\" width=\"877\" height=\"440\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-446\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:877\/h:440\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_w-YP7dxu0UXftfUO4LuF4g.webp 877w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:151\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_w-YP7dxu0UXftfUO4LuF4g.webp 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:385\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_w-YP7dxu0UXftfUO4LuF4g.webp 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:251\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_w-YP7dxu0UXftfUO4LuF4g.webp 500w\" \/><\/figure>\n\n\n\n<p>3. Click on Sync Actions and then Feeds<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-opt-id=1830867486  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_RuIbVGQH7eWs_f3hHhSh1w.webp\"  loading=\"lazy\" decoding=\"async\" width=\"589\" height=\"242\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-447\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:589\/h:242\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_RuIbVGQH7eWs_f3hHhSh1w.webp 589w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:123\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_RuIbVGQH7eWs_f3hHhSh1w.webp 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:205\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_RuIbVGQH7eWs_f3hHhSh1w.webp 500w\" \/><\/figure>\n\n\n\n<p>4. Click the <strong>Load default feed metadata<\/strong> button to load all the default feeds. This will populate the Feeds screen with all the default threat intelligence feeds that come built into MISP.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-opt-id=2067139257  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_anXm96QEEOaj-NKOCVl1JA.webp\"  loading=\"lazy\" decoding=\"async\" width=\"487\" height=\"461\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-448\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:487\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_anXm96QEEOaj-NKOCVl1JA.webp 487w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:284\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_anXm96QEEOaj-NKOCVl1JA.webp 300w\" \/><\/figure>\n\n\n\n<p>5. Next click the checkbox next to <strong>ID <\/strong>(this will select all the rows on that page). Click <strong>Enable Caching for Selected<\/strong> button followed by<strong> Enable Selected. <em>(You have to do this page by page unfortunately!)<\/em><\/strong><\/p>\n\n\n\n<p>6. Once complete, click <strong>Cache all feeds<\/strong>, then <strong>Fetch at store all feed data.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-opt-id=913721005  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_l_bAjTVjr6ExvxxK12mGZQ.webp\"  loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"181\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-449\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:720\/h:181\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_l_bAjTVjr6ExvxxK12mGZQ.webp 720w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:75\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_l_bAjTVjr6ExvxxK12mGZQ.webp 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:126\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_l_bAjTVjr6ExvxxK12mGZQ.webp 500w\" \/><\/figure>\n\n\n\n<p>7. Under Administration \u2192 Jobs you can monitor the progress<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-opt-id=397054384  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:452\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_njL21-guX8pbQMR-XDI0ug.webp\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"452\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20452%22%20width%3D%221024%22%20height%3D%22452%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22452%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-450\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:452\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_njL21-guX8pbQMR-XDI0ug.webp 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:132\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_njL21-guX8pbQMR-XDI0ug.webp 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:339\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_njL21-guX8pbQMR-XDI0ug.webp 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:397\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_njL21-guX8pbQMR-XDI0ug.webp 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:220\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_njL21-guX8pbQMR-XDI0ug.webp 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1168\/h:515\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_njL21-guX8pbQMR-XDI0ug.webp 1168w\" \/><\/figure>\n\n\n\n<p>8. You should now see events populating.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-opt-id=685264042  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_q963EYojUDgw-7LuG6br1A.webp\"  loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"274\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-452\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:720\/h:274\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_q963EYojUDgw-7LuG6br1A.webp 720w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:114\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_q963EYojUDgw-7LuG6br1A.webp 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:190\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_q963EYojUDgw-7LuG6br1A.webp 500w\" \/><\/figure>\n\n\n\n<p>9. If you click on the ID number in the ID column, it will take you to more information about the event.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-opt-id=882086669  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_tO45m1Uhv7OH_qWJsIW8lQ.webp\"  loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"580\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-453\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:720\/h:580\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_tO45m1Uhv7OH_qWJsIW8lQ.webp 720w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:242\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_tO45m1Uhv7OH_qWJsIW8lQ.webp 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:403\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/1_tO45m1Uhv7OH_qWJsIW8lQ.webp 500w\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"d3bf\"><span class=\"ez-toc-section\" id=\"Final_Thoughts\"><\/span>Final Thoughts<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p id=\"77fa\">MISP is a fantastic platform for getting started in the threat intel world. It differs to OpenCTI, in that it is built to be a middle layer between the threat intel source and your other security tooling. You can use MISP to populate data in your SIEM, OpenCTI platform and SOAR platforms for the best results.<\/p>\n\n\n\n<p id=\"1754\">Open Source threat intelligence is not a replacement for proprietary threat intel from vendors like <a href=\"https:\/\/www.recordedfuture.com\/\" rel=\"noreferrer noopener\" target=\"_blank\">Recorded Future<\/a>, but it can certainly augment existing solutions and help identify threats sooner, rather than later!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to Collect Open Source Threat Intelligence What is MISP? A threat intelligence platform for sharing, storing and correlating Indicators of<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":82,"footnotes":""},"categories":[1],"tags":[6,24,23,21,25,22,26],"class_list":["post-430","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-cybersecurity","tag-docker","tag-misp","tag-osint","tag-threat-analysis","tag-threat-intel","tag-threat-intelligence","col-md-12"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Build Your Own Cyber Threat Intel Feeds at Home! (MISP) - yashinfosec.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yashinfosec.com\/?p=430\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Build Your Own Cyber Threat Intel Feeds at Home! (MISP) - yashinfosec.com\" \/>\n<meta property=\"og:description\" content=\"Learn how to Collect Open Source Threat Intelligence What is MISP? A threat intelligence platform for sharing, storing and correlating Indicators of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yashinfosec.com\/?p=430\" \/>\n<meta property=\"og:site_name\" content=\"yashinfosec.com\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-22T08:56:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:394\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png\" \/>\n<meta name=\"author\" content=\"cyaswanthsurya@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cyaswanthsurya@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/yashinfosec.com\/?p=430#article\",\"isPartOf\":{\"@id\":\"https:\/\/yashinfosec.com\/?p=430\"},\"author\":{\"name\":\"cyaswanthsurya@gmail.com\",\"@id\":\"https:\/\/yashinfosec.com\/#\/schema\/person\/bed735a207318046f8035adf83f1dff3\"},\"headline\":\"Build Your Own Cyber Threat Intel Feeds at Home! (MISP)\",\"datePublished\":\"2024-08-22T08:56:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/yashinfosec.com\/?p=430\"},\"wordCount\":570,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/yashinfosec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/yashinfosec.com\/?p=430#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:394\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png\",\"keywords\":[\"Cybersecurity\",\"docker\",\"misp\",\"osint\",\"threat analysis\",\"threat intel\",\"threat intelligence\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/yashinfosec.com\/?p=430#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/yashinfosec.com\/?p=430\",\"url\":\"https:\/\/yashinfosec.com\/?p=430\",\"name\":\"Build Your Own Cyber Threat Intel Feeds at Home! (MISP) - yashinfosec.com\",\"isPartOf\":{\"@id\":\"https:\/\/yashinfosec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/yashinfosec.com\/?p=430#primaryimage\"},\"image\":{\"@id\":\"https:\/\/yashinfosec.com\/?p=430#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:394\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png\",\"datePublished\":\"2024-08-22T08:56:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/yashinfosec.com\/?p=430#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/yashinfosec.com\/?p=430\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/yashinfosec.com\/?p=430#primaryimage\",\"url\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png\",\"contentUrl\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png\",\"width\":1300,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/yashinfosec.com\/?p=430#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/yashinfosec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Build Your Own Cyber Threat Intel Feeds at Home! (MISP)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/yashinfosec.com\/#website\",\"url\":\"https:\/\/yashinfosec.com\/\",\"name\":\"yashinfosec.com\",\"description\":\"Explore Security In-depth\",\"publisher\":{\"@id\":\"https:\/\/yashinfosec.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/yashinfosec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/yashinfosec.com\/#organization\",\"name\":\"yashinfosec.com\",\"url\":\"https:\/\/yashinfosec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png\",\"contentUrl\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png\",\"width\":250,\"height\":250,\"caption\":\"yashinfosec.com\"},\"image\":{\"@id\":\"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/yashinfosec.com\/#\/schema\/person\/bed735a207318046f8035adf83f1dff3\",\"name\":\"cyaswanthsurya@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/yashinfosec.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47c41ba1e8b552436c6945effc63d9f982f86400a71dc3c6d8cf37cb518a3425?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47c41ba1e8b552436c6945effc63d9f982f86400a71dc3c6d8cf37cb518a3425?s=96&d=mm&r=g\",\"caption\":\"cyaswanthsurya@gmail.com\"},\"sameAs\":[\"http:\/\/yashinfosec.com\"],\"url\":\"https:\/\/yashinfosec.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Build Your Own Cyber Threat Intel Feeds at Home! (MISP) - yashinfosec.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yashinfosec.com\/?p=430","og_locale":"en_US","og_type":"article","og_title":"Build Your Own Cyber Threat Intel Feeds at Home! (MISP) - yashinfosec.com","og_description":"Learn how to Collect Open Source Threat Intelligence What is MISP? A threat intelligence platform for sharing, storing and correlating Indicators of","og_url":"https:\/\/yashinfosec.com\/?p=430","og_site_name":"yashinfosec.com","article_published_time":"2024-08-22T08:56:46+00:00","og_image":[{"url":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:394\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png","type":"","width":"","height":""}],"author":"cyaswanthsurya@gmail.com","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cyaswanthsurya@gmail.com","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/yashinfosec.com\/?p=430#article","isPartOf":{"@id":"https:\/\/yashinfosec.com\/?p=430"},"author":{"name":"cyaswanthsurya@gmail.com","@id":"https:\/\/yashinfosec.com\/#\/schema\/person\/bed735a207318046f8035adf83f1dff3"},"headline":"Build Your Own Cyber Threat Intel Feeds at Home! (MISP)","datePublished":"2024-08-22T08:56:46+00:00","mainEntityOfPage":{"@id":"https:\/\/yashinfosec.com\/?p=430"},"wordCount":570,"commentCount":0,"publisher":{"@id":"https:\/\/yashinfosec.com\/#organization"},"image":{"@id":"https:\/\/yashinfosec.com\/?p=430#primaryimage"},"thumbnailUrl":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:394\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png","keywords":["Cybersecurity","docker","misp","osint","threat analysis","threat intel","threat intelligence"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/yashinfosec.com\/?p=430#respond"]}]},{"@type":"WebPage","@id":"https:\/\/yashinfosec.com\/?p=430","url":"https:\/\/yashinfosec.com\/?p=430","name":"Build Your Own Cyber Threat Intel Feeds at Home! (MISP) - yashinfosec.com","isPartOf":{"@id":"https:\/\/yashinfosec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/yashinfosec.com\/?p=430#primaryimage"},"image":{"@id":"https:\/\/yashinfosec.com\/?p=430#primaryimage"},"thumbnailUrl":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:394\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png","datePublished":"2024-08-22T08:56:46+00:00","breadcrumb":{"@id":"https:\/\/yashinfosec.com\/?p=430#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yashinfosec.com\/?p=430"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yashinfosec.com\/?p=430#primaryimage","url":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png","contentUrl":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/08\/6165d881d7d17d7508651f27_misp-threat-intelligence-platform-main.png","width":1300,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/yashinfosec.com\/?p=430#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yashinfosec.com\/"},{"@type":"ListItem","position":2,"name":"Build Your Own Cyber Threat Intel Feeds at Home! (MISP)"}]},{"@type":"WebSite","@id":"https:\/\/yashinfosec.com\/#website","url":"https:\/\/yashinfosec.com\/","name":"yashinfosec.com","description":"Explore Security In-depth","publisher":{"@id":"https:\/\/yashinfosec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yashinfosec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/yashinfosec.com\/#organization","name":"yashinfosec.com","url":"https:\/\/yashinfosec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/","url":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png","contentUrl":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png","width":250,"height":250,"caption":"yashinfosec.com"},"image":{"@id":"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/yashinfosec.com\/#\/schema\/person\/bed735a207318046f8035adf83f1dff3","name":"cyaswanthsurya@gmail.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yashinfosec.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47c41ba1e8b552436c6945effc63d9f982f86400a71dc3c6d8cf37cb518a3425?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47c41ba1e8b552436c6945effc63d9f982f86400a71dc3c6d8cf37cb518a3425?s=96&d=mm&r=g","caption":"cyaswanthsurya@gmail.com"},"sameAs":["http:\/\/yashinfosec.com"],"url":"https:\/\/yashinfosec.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/posts\/430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=430"}],"version-history":[{"count":8,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/posts\/430\/revisions"}],"predecessor-version":[{"id":454,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/posts\/430\/revisions\/454"}],"wp:attachment":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}