Undderstanding Intelowl #756
-
Hello, I am trying to understand the system and ecosystem of intelowl where I am trying to find out why is it integrating with other platforms such as MISP, making and using analyzers, other features, and overall concept and logic. Thank you in advance! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 4 replies
-
IntelOwl is for aggregating maximum amount of threat intelligence data about a particular observable (IP, domain, hash, URL) or file. This data is collected from external sources or tools that are available as analyzers inside of IntelOwl. You can query an observable/file against 100s of these analyzers and all the data is returned to you in a unified manner. Automation and ease-of-use is key here so all this is possible in just 2 HTTP calls to IntelOwl's REST API. IntelOwl is composed of two sets of plugins - Analyzers and Connectors.
When requesting a job/analysis, you can choose precisely what analyzers or connectors should be executed or by default IntelOwl will only run the analyzers appropriate for the specific observable type or file type. IntelOwl tries to be most flexible, abstract and configurable as to enable different use-cases and capabilities for different users/organizations. So the best way to understand it is to try it out yourself. See the TL;DR installation to get IntelOwl up and running on your system in about 10 minutes. |
Beta Was this translation helpful? Give feedback.
IntelOwl is for aggregating maximum amount of threat intelligence data about a particular observable (IP, domain, hash, URL) or file. This data is collected from external sources or tools that are available as analyzers inside of IntelOwl. You can query an observable/file against 100s of these analyzers and all the data is returned to you in a unified manner. Automation and ease-of-use is key here so all this is possible in just 2 HTTP calls to IntelOwl's REST API.
IntelOwl is composed of two sets of plugins - Analyzers and Connectors.