Running Zeek and RITA on Windows

Cyber Threat Hunting Level 1 w/ Chris Brenton

Our Top Ten Network Tools and Techniques

Counting Connections With tshark

Sorting tshark’s Conversation (conv) Output

Permission to Capture Packets

Jumping the T-Shark with Chris Brenton – Video Blog

Safelist Synchronization

Filtering Out High Volume Traffic

Tshark Examples – Theory & Implementation

Threat Simulation – Beacons

How to Catch Data Exfiltration With a Single Tshark Command – Video Blog