WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
Zeek & Corelight - Encrypted Traffic Collection
Zeek, and Corelight sensors specifically, divide the process of handling and analyzing data into four distinct areas, as illustrated in...
Network Detection Response (NDR) - HTTP Analysis Part 1
HTTP is one of the most widely recognized protocols, essential for daily internet communication. Its ubiquity ensures it’s readily...
Zeek & Corelight - Core Packages
In simple terms, Zeek sensors capture traffic, generate protocol-specific log files for the captured session traffic, and can export...
Network Detection & Response (NDR) - Zeek 'Alerting' - Odd Remote Access Behavior and Tools
When collecting Zeek data, you have a rich source of information for analysis. However, when monitoring systems, it's crucial to...
Agentless Integration of IDS/IPS and Vulnerability Data
Intrusion Detection/Protection Systems (IDS/IPS) examine network traffic using rules and signatures. Some of these rules or signatures...
The Cybersecurity Suri
In the realm of cybersecurity, there is also a 'Suri,' which is the abbreviation for Suricata. Suricata stands as an open-source,...
Network Security Monitoring (NSM) - Hacker Command & Control (C&C) (C2)
Ralph Mudge developer of Cobalt Strike Red Team hacking software outlines from the hackers perspective 4 key processes that need to...
















