/pycascades2022

PyCascades demo content

Primary LanguageJupyter NotebookMIT LicenseMIT

MSTICPy - CyberSecurity with Jupyter Notebooks

PyCascades 2022

Ian Hellen

This repo contains the Jupyter notebook and PowerPoint presentation used in the talk (Sat 5th Feb 2022).

A lot of the examples in the notebook (most of those shown in the presentation) will run standalone.

Slides

Slides

The slides are available as:

Notebook

Notebook

Running the notebook in MyBinder

Binder

Running locally

Installing MSTICPy

The ones that use MSTICPy require installing MSTICPy in your Python environment. Minimum Python version is 3.6, we recommend Python 3.8 or later.

pip install msticpy

Installing MSTICPy

MSTICPy Configuration

Some of the examples also require configuration settings. A sample msticpyconfig.yaml is available in this repo.

The GeoIP lookup examples need a Maxmind GeoLite account (this is free). You must get the API key from your account settings and add it to the MSTICPy settings. The second code cell in the notebook let's you configure MSTICPy settings - choose the GeoIP Providers tab and add GeoIPLite. After entering the settings click, Update and then Save Settings

The examples using Threat Intelligence sources need one or more threat intelligence providers, e.g. Virus Total and AlienVault OTX. Create accounts at one or more of these and obtain API keys from your account settings.

In the MSTICPy settings, go to the TIProviders tab, add the appropriate provider and fill in the settings.

After entering the settings click, Update and then Save Settings

Configuring MSTICPy

Other useful references

MSTICPy Github

MSTICPy DataProviders

MSTICPy Pivot Functions

MSTICPy Visualizations

MSTICPy Sample notebooks