How Do Threat Hunting Tools Find Outbound Connections?

Running Zeek and RITA on Windows

RITAv5 – The Video Series

Malware of the Day – Understanding C2 Beacons – Part 2 of 2

Malware of the Day – Understanding C2 Beacons – Part 1 of 2

Intro to RITA v5!

Cyber Threat Hunting Level 1 w/ Chris Brenton

The New and Improved RITA w/ Chris Brenton

Zeek Log Analysis Using Hacky Scripts

Detecting Beacons by System Name with RITA and AC-Hunter

Threat Hunting Shorts – Safelisting – Video Blog

Threat Hunting Shorts – C2 over DNS – Video Blog