{"id":11267,"date":"2022-01-09T22:57:21","date_gmt":"2022-01-09T19:57:21","guid":{"rendered":"https:\/\/kifarunix.com\/?p=11267"},"modified":"2024-03-14T19:13:57","modified_gmt":"2024-03-14T16:13:57","slug":"analyze-network-traffic-using-zeek","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/analyze-network-traffic-using-zeek\/","title":{"rendered":"Analyze Network Traffic using Zeek"},"content":{"rendered":"\n

In this tutorial, you will learn how to analyze network traffic using Zeek. Zeek<\/a> is a world’s leading passive network security monitoring tool that sits on the network and read all the traffic passing through the network, parses them into a high-level events that can then be passed through Zeek policy script intepreter which then generates comprehensive record\/logs of every connection seen on the wire including all HTTP sessions with their requested URIs, key headers, MIME types, and server responses; DNS requests with replies; SSL certificates; key content of SMTP sessions e.tc<\/em>.<\/p>\n\n\n\n

Analyzing Network Traffic with Zeek<\/h2>\n\n\n\n

In our previous guides, we have learnt how to install and setup Zeek on various systems;<\/p>\n\n\n\n

Install Zeek on Debian 11<\/a><\/p>\n\n\n\n

Install Zeek on Ubuntu 20.04<\/a><\/p>\n\n\n\n

Analyzing Network Traffic<\/h3>\n\n\n\n

If you check on the logs directory, Zeek generates quite a number of logs including;<\/p>\n\n\n\n