Zeek in Action, Video 1, Suspected Malware Compromise

Описание к видео Zeek in Action, Video 1, Suspected Malware Compromise

The first video examining network traffic using Zeek and related applications is now available. This episode looks at a suspected malware compromise, posted by Brad Duncan on his Malware Traffic Analysis site. We use Brim to create Zeek and Suricata logs from a packet capture, and then we review the outputs for signs of suspicious and malicious activity.

Комментарии

Информация по комментариям в разработке