#SOCtools

2025-05-19

🐽 Snort Command Cheat Sheet: Understand Network Threats Like a Pro

Snort is a powerful open-source tool used for Network Intrusion Detection and Prevention (NIDS/NIPS). It's widely adopted by blue teams and security professionals to monitor, alert, and defend against malicious network activity.

🧠 Key Usage Modes (No Code Needed):

β€’ Test Mode: Check configuration files before deployment
β€’ Packet Sniffing Mode: Monitor live traffic and display it in real time
β€’ Packet Logging Mode: Capture packets and store them for analysis
β€’ IDS Mode: Analyze traffic against rule sets and raise alerts
β€’ Silent Mode: Run in the background while logging events

πŸ›‘οΈ Snort is great for:
β€’ Detecting port scans and suspicious payloads
β€’ Monitoring traffic for policy violations
β€’ Integrating with SIEM solutions
β€’ Practicing blue team defensive strategies

Disclaimer: This content is intended strictly for educational and awareness purposes. Use intrusion detection systems responsibly and ethically.

#Snort #NetworkSecurity #CyberSecurity #InfoSec #BlueTeam #IDS #EducationOnly #IntrusionDetection #SOCTools #PacketAnalysis

Lenin alevski πŸ•΅οΈπŸ’»alevsk@infosec.exchange
2025-04-22

New Open-Source Tool Spotlight 🚨🚨🚨

"Threat-Informed Defense" isn't just a buzzword. The Center for Threat-Informed Defense bridges MITRE ATT&CK with actionable tools like Adversary Emulation Plans and the Attack Workbench, empowering defenders to stay ahead of real-world TTPs. #CyberDefense #MITREATTACK

Want to map security controls to adversary behavior? Check out Mappings Explorer by the Center for Threat-Informed Defense. It aligns your defense strategy directly with the MITRE ATT&CK framework. Precision matters. #ThreatIntelligence #Cybersecurity

Attack Flow helps you visualize how attackers chain techniques into full-scale operations. An indispensable tool for understanding and mitigating attack sequences. Powered by the Center for Threat-Informed Defense. #SOCtools #ThreatModeling

TRAM leverages automation to map CTI reports directly to MITRE ATT&CK tactics and techniques. Less manual work, more actionable insights. Open-source ingenuity at its best. #CyberThreats #MITREATTACK

Building effective cyber analytics requires depth; "Summiting the Pyramid" delivers frameworks to challenge adversary evasion strategies. A research-backed way to harden defenses. #CyberAnalytics #ThreatHunting

πŸ”— Project link on #GitHub πŸ‘‰ github.com/center-for-threat-i

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

β€” ✨
πŸ” P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking πŸ’»πŸ΄β€β˜ οΈ

2024-10-11

It’s always hard to find all typosquatted domains and analyse them. This webtool is a good starting point for further analyses and helps a lot.

haveibeensquatted.com/

#blueteam #typosquatting #detection #blueteamtools #soctools

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst