JavaScriptが無効です。ブラウザの設定でJavaScriptを有効にしてください
再生時間:
投稿日:
動画サイト:
画質:
Discover the power of the world's best network security monitor, Zeek, and how Corelight makes it much simpler to use.
YouTube-Corelight
What is Corelight?
Zeek Collections
Zeek Core Collection
Open-source Zeek (formerly Bro) is one of network securitys best kept secrets. Deployed out-of-band by thousands of the worlds top blue ...
Agenda
Why packet capture is expensive
History of Bro
Zeek Input Framework
Zeek Connection Log
Zeek Community ID
Learn more about Zeek TTPs
Fingerprinting SSL connections
Zeek Corporate Plug
Closing Remarks
An introductory overview of the threat hunting capabilities of the Zeek Network Security Monitor (formerly known as Bro), with demos of ...
Zeek Sensors Are Deployed out-of-Band
Approach to Consulting
Certificates
Demo of Graph
How Zeke Is Seeing Host Data
Automation
Other Examples of Community Scripts That You Would Recommend
Favorite Queries
Protocol Analysis
Open source tools provide fantastic value for cyber threat hunting. In today's #TechTalkTuesday, we explore the basics of Zeek, walk through ...
YouTube-Insane Forensics
Intro
What is Zeek
How to Install Zeek
How to Use Zeek
Exploring Default Zeek Logs
Outro
Introduction to hands-on network monitoring and threat detection with Zeek (formerly Bro). https://tryhackme.com/room/zeekbro Zeek (formerly ...
YouTube-Djalil Ayed
Zeek's Redemption: G2 Outcast to VALORANT Champion | Esports Stories. VALORANT star Zeek thought he had it all after he joined G2 Esports.
YouTube-DEXERTO VALORANT
In episode 10 of Zeek in Action, Richard examines the four types of network security monitoring data: 1) full content data ("PCAP"), ...
YouTube-Zeek
Intrusion Detection System Alerts
Zeek Data Density
Changing the columns in the Zeek display
Viewing packets from a single session
Examining the file log
Threat Assessment
External References and Con Log
DNS Request Data
Conclusion
What data in cyber threat intelligence reports can be useful to Zeek users? This video examines three DFIR Report publications with an eye ...
Sources of Free Cyber Threat Intelligence Reports
The Four Types of Network Security Monitoring Data
Types of Network Security Monitoring Data
Ids Alerts
Proxy Shell
Timeline
Breakout Time
Other Indicators
Domain and Local Admin Recon
Computer Discovery via Icmp
Zeek (formerly Bro) is one of network securitys best kept secrets. Deployed out-of-band by thousands of the worlds top blue teams, ...
Welcome
Zeek Outputs
What does Zeek log data matter?
Zeek SMB Logs
Why does query length matter?
Corelight proprietary insights
Zeek in cloud networks
98 likes, 1 comments - zeek.ind on October 12, 2023: "Last Friday, @boykamusic & @exbowww took center stage at @zeek.ind and rewrote the ...
Instagram
By Boaz Wasserman, Senior Security Researcher, Microsoft At Microsoft, we have created a modified version of Zeek that can run natively on ...
Raw Telemetry
Device Discovery
Advantages
Device Discovering Classification
Build Version
Malicious Activity Detection
On Device Skip Logic
Integrate Endpoint Telemetry about File Operations
Conclusions
Trade-Offs
119 likes, 3 comments - zeek.ind on September 20, 2023: "Last Friday Showcase, #BEATCRUSHEXPERIENCE was off the roof‼️
How do you get your packet and stream data out of Zeek so that you can use it in Machine Learning? How can you classify your network data ...
YouTube-SANS Cyber Defense
Defining a model
Configuring Zeek to listen on localhost
Triggering events
Starting Zeek
Deploying Zeek
Creating a status subscription
Getting DNS data
Formatting messages
43 likes, 0 comments - zeek.ind on November 17, 2023: "Food Roulette: Risk-taking never felt so good.✨ Reserve your experience at Zeek- +91 ...
ZEEK POWER - PERMANENT (Official Video) Official video for "Permanent" Performed by Zeek Power Produced by Zachary Staines Filmed and ...
YouTube-Zeek Power
10 likes, 0 comments - zeek.ind on May 2, 2024: "This Saturday, get ready for an electrifying night at #BOLLYBLAST with the amazing ...
This is the recording of the training offered by Keith Lehigh, Fatema Bannat Wala, and Aashish Sharma on using Zeek and writing Zeek scripts ...
Who are we?
Zeek User Interface
Zeek Control Framework
Analyzing Zeek Log Files
Break Time
TCP Connection States
SSL Certificate Expired Notice
Important Zeek Binaries
https://TheCypherEffect.com Presents: Zeek UC - End Is Near [ Music Video ] Produced by Maintain Shot by @robdriscal ▻ SUBSCRIBE: ...
YouTube-The Cypher Effect: Hip Hop Music Network
In this Zeek in Action video, Keith Jones explains his Spicy protocol analyzer rapid development process on a new Radius analyzer.
Outline
Create the Package
Find PCAPS
Setup Tests with PCAPS 1. Place PCAP in the testing traces directory
Write Code
39 likes, 1 comments - zeek.ind on November 28, 2023: "Let's crank up the #Zeekend temperature and kick off the this Major Rager ft.