Zeek Logo
  • Get Zeek
    • Downloads
    • GitHub
    • Packages
    • Try Zeek Online
  • Documentation
    • Feature Release
    • LTS Release
    • Development Version
    • Dev Resources
    • FAQs
  • Community
    • Getting Started
    • Email Sign Up
    • Connect
      • Twitter
      • YouTube
      • Discourse
      • Slack
      • GitHub
      • Security Reporting
      • Contact
    • Subgroups
    • Training
  • Events
    • Upcoming Events
    • Calendar
    • ZeekWeek 2022
    • Past Events
  • Blog
  • About
    • About Zeek
    • Leadership Team
    • Code of Conduct
    • Slack Guidelines
    • Governance Framework
    • Mission, Vision, Values
Zeek in Action, Video 4, Where Should I Put My Sensor?

Zeek in Action, Video 4, Where Should I Put My Sensor?

by Amber Graner | Jul 28, 2021 | community, Zeek in Action

In this episode, Richard Bejtlich explores how to figure out where to put a sensor on your network. He describes a simple enterprise network, traffic flows, and device addressing, all of which affect sensor placement. Find out more in this introductory level...
Zeek in Action, Video 3, Comparisons of Data Sources

Zeek in Action, Video 3, Comparisons of Data Sources

by Amber Graner | Jun 21, 2021 | Zeek in Action

In this episode, Richard Bejtlich looks at PCAPs from Tcpreplay using Zeek, Brim Security and Wireshark. This comparison isn’t to say one tool is better than the other, but to show users what data each tool provides the users. If you would like to follow along, please...
Zeek In Action, Video 2, Tracing a Trickbot Infection

Zeek In Action, Video 2, Tracing a Trickbot Infection

by Amber Graner | May 18, 2021 | community, Zeek in Action

In this episode, Richard Bejtlich traces a trickbot infection known as CATBOMBER, posted by Brad Duncan on his Malware Traffic Analysis site.  Richard uses try.zeek.org to look at the PCAP for signs of suspicious and malicious activity and answer the questions...
Welcome to Zeek in Action, Video 1, Suspected Malware Compromise

Welcome to Zeek in Action, Video 1, Suspected Malware Compromise

by Richard Bejtlich | Apr 14, 2021 | community, Zeek in Action

The first video examining network traffic using Zeek and related applications is now available. This episode looks at a suspected malware compromise, posted by Brad Duncan on his Malware Traffic Analysis site. We use Brim to create Zeek and Suricata logs from a packet...

Zeek in Action: Introduction and How to Set Up a Windows Workstation Using Brim Security

by Richard Bejtlich | Apr 6, 2021 | community, Zeek in Action

Welcome to Zeek in Action, a new series of videos for Zeek users and fans. The purpose of the series is to show how analysts can interpret data in Zeek and related formats to solve various networking challenges. The focus will mainly be on security use cases, but we...
Next Entries »

RSS feed RSS - Posts

Tweets by Zeekurity

Get Zeek
Downloads
Zeek GitHub

Add-on Packages
Try Zeek Online

Documentation
Feature Release
LTS Release
Dev Version
Dev Resources
FAQs

Community
Getting Started
Sign Up
Twitter
Youtube
Discourse
Slack
GitHub Issues
Security Reporting
Contact Us
Subgroups
Training

Events
Upcoming Events

Calendar
ZeekWeek 2022
Past Events

Blog

About About Zeek Leadership Team Code of Conduct Slack Guidelines Governance Framework Mission, Vision, Values

  • Twitter
  • Google

© 2020 The Zeek Project. Privacy Policy

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
 

Loading Comments...