Jan 23 · 4 min read · Room Link: https://tryhackme.com/room/mastermindsxlq Objectives: Log analysis using Brim Identifying suspicious domains and IP addresses Threat intelligence analysis Identifying malware types based on downloaded executables Task 1: Detect the c...
Join discussion
Oct 12, 2025 · 4 min read · الـسـلام عـلـيكـم ورحـمـة الله وبـركاته Last time, we talked about Network Forensics and mentioned briefly some of the main tools we use. In this article, I’ll give a simple explanation of each tool along with learning resources, so we can understand...
Join discussion
Oct 10, 2025 · 4 min read · Introduction: BRIM is an open-source desktop application that processes pcap files and logs files. Its primary focus is providing search and analytics. It uses the Zeek log processing format. It also supports Zeek signatures and Suricata Rules for d...
Join discussion