Threat Simulation – Unexpected Protocol on Non-Standard Port
Threat Simulation Overview and Setup
Identifying Compromises Through Device Profiling
How to Use Zeek to Catch Data Exfiltration With a Single Command – Video Blog
Suspicious Traffic Found – What Are the Next Steps?
Finding the Cumulative Communication Time Between Systems Using Zeek – Video Blog
Finding Long Connections With Zeek – Video Blog