May 5, 2023, 1:09 a.m. | /u/Fun_Chest_9662

cybersecurity www.reddit.com

To all the Packet heads and Threat Hunters out there, what is the general flow you have when initially investigating captures or live traffic? Brim, zeek, snort, wireshark? Or do you run them through a SIEM like security onion or splunk?

Just wanting to stir up some conversation and learn how others approach the task.

Edit: the questions mostly for individual fun or practice cases. Feel free to add business cases too! All are good to know!

analysis brim conversation cybersecurity flow general hunters hunting learn live onion packet run security siem snort splunk stir task threat threat hunting traffic what is wireshark zeek

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Premium Hub - CoE: Business Process Senior Consultant, SAP Security Role and Authorisations & GRC

@ SAP | Dublin 24, IE, D24WA02

Product Security Response Engineer

@ Intel | CRI - Belen, Heredia

Application Security Architect

@ Uni Systems | Brussels, Brussels, Belgium

Sr Product Security Engineer

@ ServiceNow | Hyderabad, India

Analyst, Cybersecurity & Technology (Initial Application Deadline May 20th, Final Deadline May 31st)

@ FiscalNote | United Kingdom (UK)