top of page
WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
Home: Welcome
Search
brencronin
Oct 22, 202412 min read
Zeek & Corelight - Encrypted Traffic Collection
Zeek, and Corelight sensors specifically, divide the process of handling and analyzing data into four distinct areas, as illustrated in...
Â
Â
Â
brencronin
Oct 9, 20246 min read
Network Detection Response (NDR) - HTTP Analysis Part 1
HTTP is one of the most widely recognized protocols, essential for daily internet communication. Its ubiquity ensures it’s readily...
Â
Â
Â
brencronin
Jun 12, 20249 min read
Zeek & Corelight - Core Packages
In simple terms, Zeek sensors capture traffic, generate protocol-specific log files for the captured session traffic, and can export...
Â
Â
Â
brencronin
Dec 26, 20237 min read
Network Detection & Response (NDR) - Zeek 'Alerting' - Odd Remote Access Behavior and Tools
When collecting Zeek data, you have a rich source of information for analysis. However, when monitoring systems, it's crucial to...
Â
Â
Â
brencronin
Sep 24, 20233 min read
Network Security Monitoring (NSM) - Hacker Command & Control (C&C) (C2)
Ralph Mudge developer of Cobalt Strike Red Team hacking software outlines from the hackers perspective 4 key processes that need to...
Â
Â
Â
Home: Blog2
Home: Contact
bottom of page














