Malware Command and Control – How it Works – Video Blog

Changing Zeek’s Log Rotation Time

How to Install a VMWare Virtual Machine

On Which Interface Should I Capture Packets?

Packet Loss, or “Why Is My Sniffer Dropping Packets?”

Adding a 2FA to Any Network Service

Yubikeys – Introduction

Threat Hunting Process Injection With Jupyter Notebook and Sysmon

Jumping the T-Shark with Chris Brenton – Video Blog

Hunting for Persistence in Linux (Part 1): Auditd, Sysmon, Osquery (and Webshells)

Threat Hunting Over the Network With Zeek and RITA

Building a Global Ignore Filter