Lab 10: NER & Information Extraction
Objective
Background
Raw text:
"APT28 exploited CVE-2023-23397 in Microsoft Outlook to steal NTLM hashes
from victims at 192.168.1.45 using a technique mapped to T1187 in MITRE ATT&CK."
Extracted entities:
THREAT_ACTOR: APT28
CVE: CVE-2023-23397
PRODUCT: Microsoft Outlook
TECHNIQUE: NTLM hash theft
IP_ADDRESS: 192.168.1.45
MITRE_TTK: T1187Step 1: Environment Setup
Step 2: Rule-Based NER — Regex Patterns
Step 3: Threat Actor Recognition
Step 4: IOC (Indicator of Compromise) Classifier
Step 5: Relation Extraction
Step 6: MITRE ATT&CK Technique Mapping
Step 7: Building an NER Pipeline
Step 8: Real-World Capstone — Threat Intelligence Enrichment Engine
Summary
Technique
Best For
Pros
Further Reading
Last updated
