Thanks!
<1. if the attacker compromises your agent or is able to mimic..>
True that; it's a client-side agent so it has the same issues that AV,
HIPS, etc have as far as an active attacker.
The server only sends IOCs bound for the agent IP range and does so
over SSL, so there are some protections against an attacker gaining
access to all IOCs. The server is meant to be instantiated as needed
and so a minor deterrent would be the attacker needing the IP of the
server. I'd thought of building some authentication into the SSL
handshake but it's not there yet.
< 2. There are a lot of IOCs out there. One at a time will take a long time.>
That's true. There's definitely room for enhancement especially using
caching of files/registry/hashes and multithreading. As a previous
post mentioned, I think there is lots of room for pre-processing IOCs
to find the fastest route to conclusion (i.e. an ioc consisting of
process OR file hash will always complete faster examining processes).
<It might be better/faster if you aggregated the IOC definitions server side
into a format your agent can make use of directly>
I thought about transforming IOC to yara rules or some other format,
but wanted to just focus on IOC for this release. If someone generates
a pre-processor for IOCs it may be best to 'compile' them for agents
to guarantee the shortest path to completion.
Thanks for the feedback! Much appreciated!