WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
Network Detection Response (NDR) - Web Traffic Analysis Part 2
Overview of major security tools related to web traffic protection Protection from Inside to Outside Traditional web protection largely...
Zeek & Corelight - Encrypted Traffic Collection
Zeek, and Corelight sensors specifically, divide the process of handling and analyzing data into four distinct areas, as illustrated in...
Network Detection Response (NDR) - HTTP Analysis Part 1
HTTP is one of the most widely recognized protocols, essential for daily internet communication. Its ubiquity ensures it’s readily...
Zeek & Corelight - Core Packages
In simple terms, Zeek sensors capture traffic, generate protocol-specific log files for the captured session traffic, and can export...
Network Detection & Response (NDR) - Zeek 'Alerting' - Odd Remote Access Behavior and Tools
When collecting Zeek data, you have a rich source of information for analysis. However, when monitoring systems, it's crucial to...
Network Security Monitoring (NSM) - Hacker Command & Control (C&C) (C2)
Ralph Mudge developer of Cobalt Strike Red Team hacking software outlines from the hackers perspective 4 key processes that need to...















