How to Threat Hunt for C2 Traffic Regardless of Protocol or Port

Опубликовано: 30 Сентябрь 2024
на канале: Corelight
2,763
53

Learn how to get a better handle on c2 and advanced threat hunting techniques using open-source Zeek Logs + Active Countermeasures RITA.

Corelight makes powerful network security monitoring (NSM) solutions that transform network traffic into rich logs, extracted files, and security insights, helping security teams achieve more effective incident response, threat hunting, and forensics. Corelight Sensors run on Zeek (formerly called “Bro”), the open-source NSM tool used by thousands of organizations worldwide. Corelight’s family of network sensors dramatically simplify the deployment and management of Zeek and expand its performance and capabilities. Corelight is based in San Francisco, California and its global customers include Fortune 500 companies, large government agencies, and major research universities.