AC-Hunter Installation

Installation of AC-Hunter

AC-Hunter leverages Zeek/Bro and RITA to collect packet information from your network and analyze the results. Zeek/Bro runs on a single system and connects to a span port just inside your firewall. The AC-Hunter/RITA system can be located anywhere on your internal network provided it has connectivity to the Zeek/Bro system.

If you have multiple connections to the Internet, you can run multiple Zeek/Bro systems or sensors, all feeding data back to the same RITA/AC-Hunter™ Web Interface.

Does your environment need more than the default configuration? Active Countermeasures has teamed up with Black Hills Information Security (BHIS) to offer professional threat hunting sessions and/or threat assessment training for your analysts. BHIS can offer a package deal which includes:

  • Architecture support in deploying AC-Hunter to your environment
  • Installation and configuration of AC-Hunter per your specific needs
  • A professional threat detection assessment of your network
  • Threat hunting training for your security analysts

Contact Black Hills Information Security and find out more here.

We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)


We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)