All Projects → mytechnotalent → Zeek-Network-Security-Monitor

mytechnotalent / Zeek-Network-Security-Monitor

Licence: Apache-2.0 License
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.

Programming Languages

Zeek
47 projects

Projects that are alternatives of or similar to Zeek-Network-Security-Monitor

Ivre
Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+6034.21%)
Mutual labels:  bro, network-monitoring, network-analysis, network-security, zeek
Nfstream
NFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+1536.84%)
Mutual labels:  pcap, cybersecurity, network-monitoring, network-analysis, network-security
ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+7036.84%)
Mutual labels:  bro, network-monitoring, network-analysis, network-security, zeek
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+15065.79%)
Mutual labels:  cybersecurity, cyber, cyber-security, cyber-threat-intelligence
Zeek
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Stars: ✭ 4,180 (+10900%)
Mutual labels:  pcap, bro, network-monitoring, zeek
zeek-docs
Documentation for Zeek
Stars: ✭ 41 (+7.89%)
Mutual labels:  pcap, bro, network-monitoring, zeek
network-tools
Network Tools
Stars: ✭ 27 (-28.95%)
Mutual labels:  pcap, network-monitoring, network-analysis, network-security
pycommunityid
A Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (-52.63%)
Mutual labels:  network-monitoring, network-security-monitoring, network-security
Poseidon
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict the type of device.
Stars: ✭ 310 (+715.79%)
Mutual labels:  pcap, network-monitoring, network-analysis
Scapy
Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+18142.11%)
Mutual labels:  pcap, network-analysis, network-security
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+60.53%)
Mutual labels:  cybersecurity, cyber-security, cyber-security-team
packet cafe
A platform built for easy-to-use automated network traffic analysis
Stars: ✭ 40 (+5.26%)
Mutual labels:  pcap, network-analysis, network-traffic
community-id-spec
An open standard for hashing network flows into identifiers, a.k.a "Community IDs".
Stars: ✭ 137 (+260.53%)
Mutual labels:  network-monitoring, network-security-monitoring, network-security
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+302.63%)
Mutual labels:  cybersecurity, cyber, cyber-security
testmynids.org
A website and framework for testing NIDS detection
Stars: ✭ 55 (+44.74%)
Mutual labels:  network-monitoring, network-security-monitoring, network-security
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+18936.84%)
Mutual labels:  cybersecurity, cyber-security, cyber-threat-intelligence
ssldump
ssldump - (de-facto repository gathering patches around the cyberspace)
Stars: ✭ 160 (+321.05%)
Mutual labels:  network-monitoring, network-analysis
arpwitch
A modern arpwatch replacement with JSON formatted outputs and easy options to exec commands when network changes are observed.
Stars: ✭ 20 (-47.37%)
Mutual labels:  network-monitoring, network-analysis
robot hacking manual
Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+344.74%)
Mutual labels:  cybersecurity, cyber-security
PoW-Shield
Project dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (+160.53%)
Mutual labels:  cybersecurity, network-security

image

FREE Reverse Engineering Self-Study Course HERE


Zeek Network Security Monitor Tutorial

A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.

Lesson 1: Setup

In this lesson we set up a basic Ubuntu computer connected directly to an inexpensive tap which connects to your home router. I have provided products you can purchase if you do not have existing parts however please feel free to use any network tap of your choosing and/or any additional Ethernet adapters or cables of your choosing.

-> Click HERE to read the article on Medium.

Lesson 2: alert-all-notices.zeek

In this lesson we create an alert by logging all notices that Zeek deems worthy of your attention to the notice.log file in addition to sending you an email.

-> Click HERE to read the article on Medium.

Lesson 3: conn.log

In this lesson we will show the source IP addresses and ports and their destination IP addresses and ports.

-> Click HERE to read the article on Medium.

Lesson 4: conn.log - 2

In this lesson we will show the source IP addresses that generated the most network traffic, organized in descending order.

-> Click HERE to read the article on Medium.

Lesson 5: conn.log - 3

In this lesson we will show the destination ports that received the most network traffic, organized in descending order.

-> Click HERE to read the article on Medium.

Lesson 6: conn.log - 4

In this lesson we will show the number of connections per protocol service.

-> Click HERE to read the article on Medium.

Lesson 7: conn.log - 5

In this lesson we will show the distinct browsers used by the hosts.

-> Click HERE to read the article on Medium.

Lesson 8: conn.log - 6

In this lesson we will show the source and destination IP addresses of all UDP and TCP connections that lasted more than 90 seconds.

-> Click HERE to read the article on Medium.

Lesson 9: conn.log - 7

In this lesson we will show whether there any web servers operating on non-standardized ports.

-> Click HERE to read the article on Medium.

Lesson 10: conn.log - 8

In this lesson we will show the state history of connections as a string of letters.

-> Click HERE to read the article on Medium.

License

Apache License, Version 2.0

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].