Suricata and Cuckoo - Identify Malicious Network Activity Within Your Cuckoo Sandbox!
HTML-код
- Опубликовано: 8 сен 2024
- Join me as we add Suricata to our Cuckoo processing. Detect malicious network activity with Suricata! Let's deploy a Host Intrusion Detection System and SIEM with free open source tools. Join me as we explore and learn together.
Doc: suricata.readt...
Discord Channel: / discord
Check us out: www.opensecure...
Interact with our demo: www.opensecure...
Hire us: www.opensecure...
Man I have been implementing opensource tools for a while now and always find most of the video lack in explaining the workflow. Where u standout and create a complete playlist to explain it from start... Appreciate it 🙏🙏🙏🙏
Thanks for watching!
@psd Cn where ya from
excellent video congratulations, I hope to see meerkat together with wazuh
Really appreciate your video, brother
Have you tried using cuckoo3? The version you've referenced here is quite old. Just curious what's going on today.
When i type cuckoo to start cuckoo again i get the message cuckoo is already running. PID:30680 . How do i resolve this?