❌

Reading view

Introduction to Zeek Log Analysis

In this video, Troy Wojewoda discusses the intricacies of Zeek log analysis, focusing on how this network security monitoring system can be used to understand traffic and analyze logs effectively.

The post Introduction to Zeek Log Analysis appeared first on Black Hills Information Security, Inc..

  •  

How to Monitor Network Traffic with Virtualized Bro 2.51 on Ubuntu 16.04.2 on ESXi 6.5

Kent Ickler //Β  You’ve heard us before talk about Bro, an IDS for network monitoring and analysis. Β We’ve had several installs of Bro over time here at BHIS. Β It’s about […]

The post How to Monitor Network Traffic with Virtualized Bro 2.51 on Ubuntu 16.04.2 on ESXi 6.5 appeared first on Black Hills Information Security, Inc..

  •  

How to Identify Network Vulnerabilities with NetworkRecon.ps1

David Fletcher // Β  Whenever I have the opportunity, I like to perform packet collection on a test for about five minutes so I can analyze the results and look […]

The post How to Identify Network Vulnerabilities with NetworkRecon.ps1 appeared first on Black Hills Information Security, Inc..

  •  
❌