How Do Threat Hunting Tools Find Outbound Connections?

Generating Passwords

Finding Broadcast and Multicast Traffic on Your Network

Remote Packet Capture

Problems With Packet Capture

zcutter – More Flexible Zeek Log Processing

Network Scanners

Peering Inside

Permission to Capture Packets

Is It OK to Capture Packets in a Virtual Machine?

Threat Hunting Resources

Changing Zeek’s Log Rotation Time