top of page
WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
Home: Welcome
Search
brencronin
Oct 22, 202412 min read
Zeek & Corelight - Encrypted Traffic Collection
Zeek, and Corelight sensors specifically, divide the process of handling and analyzing data into four distinct areas, as illustrated in...
brencronin
Oct 9, 20246 min read
Network Detection Response (NDR) - HTTP Analysis Part 1
HTTP is one of the most widely recognized protocols, essential for daily internet communication. Its ubiquity ensures it’s readily...
brencronin
Jun 12, 20249 min read
Zeek & Corelight - Core Packages
In simple terms, Zeek sensors capture traffic, generate protocol-specific log files for the captured session traffic, and can export...
brencronin
Dec 26, 20237 min read
Network Detection & Response (NDR) - Zeek 'Alerting' - Odd Remote Access Behavior and Tools
When collecting Zeek data, you have a rich source of information for analysis. However, when monitoring systems, it's crucial to...
brencronin
Sep 23, 20233 min read
Network Security Monitoring (NSM) - Hacker Command & Control (C&C) (C2)
Ralph Mudge developer of Cobalt Strike Red Team hacking software outlines from the hackers perspective 4 key processes that need to...
Home: Blog2
Home: Contact
bottom of page














