Suricata and Cuckoo - Identify Malicious Network Activity Within Your Cuckoo Sandbox!

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024
  • Join me as we add Suricata to our Cuckoo processing. Detect malicious network activity with Suricata! Let's deploy a Host Intrusion Detection System and SIEM with free open source tools. Join me as we explore and learn together.
    Doc: suricata.readt...
    Discord Channel: / discord
    Check us out: www.opensecure...
    Interact with our demo: www.opensecure...
    Hire us: www.opensecure...

Комментарии • 8

  • @Partha77282
    @Partha77282 2 года назад +1

    Man I have been implementing opensource tools for a while now and always find most of the video lack in explaining the workflow. Where u standout and create a complete playlist to explain it from start... Appreciate it 🙏🙏🙏🙏

  • @yefreanquiquijana6193
    @yefreanquiquijana6193 2 года назад +1

    excellent video congratulations, I hope to see meerkat together with wazuh

  • @tawabullas5058
    @tawabullas5058 Год назад

    Really appreciate your video, brother

  • @robnadeau13
    @robnadeau13 Год назад

    Have you tried using cuckoo3? The version you've referenced here is quite old. Just curious what's going on today.

  • @georgiamichael5963
    @georgiamichael5963 Месяц назад

    When i type cuckoo to start cuckoo again i get the message cuckoo is already running. PID:30680 . How do i resolve this?