Published onJune 9, 2021Analyzing Zeek's SSH Brute Force Detection ScriptzeekdpiAnalyzing Zeek's built-in SSH brute force detection script, understanding its detection logic and threshold design.
Published onApril 30, 2021Using Zeek to Analyze POP3 Protocol (2)zeekdpiContinuing POP3 protocol analysis — extracting and reconstructing email content.
Published onApril 26, 2021Using Zeek to Analyze POP3 Protocol (1)zeekdpiUsing Zeek to parse POP3 protocol, exploring Zeek's API and event-driven protocol analysis.