I tweeted this the other day, and had a lot of folks reach out asking for more details/a diagram of this setup.
After DEF CON last year, we posted this blog about our infrastructure, which was spread between a handful of Intel NUCs, and AWS. It was epic. It was shiny and new. We loved it.
We never wrote up a blog post for DC27, but this excerpt from the closing ceremonies covers most of what we would've written.
Part of our job at Recon relies on fine tuning our threat signatures that make up the bulk of our pipeline rules in our Graylog environment.
The Recon incident response team recently worked an intrusion case involving a Confluence web application server that was affected by CVE-2019-3396.
In a previous post, we shared our affinity for ZeroTier:
We're very excited to announce that we'll be bringing our NDR training to Black Hat this year! Come join us for the Network Defense Range Crucible - Live Adversary Detection and Incident Response during Black Hat 2019 Trainings!
Hello, dear friends. The past few days have been extremely hard on the OpenSOC Team. We hope this isn't the first time you're hearing of this, but a beloved friend of our team, devnull (aka Nolan Berry), passed away this past Friday, November 9, 2018. I'd try to find the words to express our sadness, but it would be an exercise in futility.
When I joined the OpenSOC team at the beginning of this year, everything resided on 3 Intel Skull Canyon NUC's, a couple other systems for scenarios or applications with hardware requirements, a Ubiquiti WAP, a Synology NAS, and various other things.
Huge thanks to @BlueTeamVillage and all of the awesome projects that make up OpenSOC Blue CTF!