Published onJune 9, 2021Analyzing Zeek's SSH Brute Force Detection ScriptzeekDPIAnalyzing Zeek's built-in SSH brute force detection script, understanding its detection logic and threshold design.
Published onApril 30, 2021Using Zeek to Analyze POP3 Protocol (2)zeekDPIContinuing POP3 protocol analysis — extracting and reconstructing email content.
Published onApril 26, 2021Using Zeek to Analyze POP3 Protocol (1)zeekDPIUsing Zeek to parse POP3 protocol, exploring Zeek's API and event-driven protocol analysis.