A Network Threat Hunter’s Guide to C2 over QUIC
Remote Packet Capture
Problems With Packet Capture
Our Top Ten Network Tools and Techniques
zcutter – More Flexible Zeek Log Processing
What Is This TCP or UDP Port
Suspicious Traffic Found – What Are the Next Steps?
Finding Long Connections With Zeek – Video Blog
MITRE ATT&CK Matrix – Custom C2 Protocol
MITRE ATT&CK HTTPS
Identifying Beacons Through Session Size Analysis
Threat Hunting as a Process