Peering Inside

Counting Connections With tshark

Sorting tshark’s Conversation (conv) Output

Running Your Security Team Like a Startup

Permission to Capture Packets

Port Forwarding With VirtualBox

Is It OK to Capture Packets in a Virtual Machine?

Threat Hunting Resources

Hunting Windows Event Logs

Proper Safelisting When Threat Hunting

Why Threat Hunting should be a Security Standards Requirement

Threat Hunting Shorts – Collecting The Right Data – Video Blogs