Richard Bejtlich's blog on digital security, strategic thought, and military history.
Vote for Sguil at SANS ISC Poll
Get link
Facebook
X
Pinterest
Email
Other Apps
Thanks to Brandon Greenwood I learned that the current SANS ISC poll asks for your favorite Snort interface. Sguil is currently running third behind BASE and ACID. Visit SANS ISC and vote for Sguil!
Get link
Facebook
X
Pinterest
Email
Other Apps
Comments
Anonymous said…
Uhhh no, Sguil is running 3rd, behind Acid and Base. Don't appear to be in order. As of this post, Acid has 28%, Base has 19%, and Sguil has 14%.
Anonymous said…
Sguil is at 14%. Wow! That means that 86% of those that responded are rookies! ;)
Anonymous said…
I have to believe that anyone who didn't vote for Sguil has never used it. ;)
Anonymous said…
Currently:
28% = Acid 17% = Sguil 17% = BASE
Hey, SGUIL is more than just an interface to SNORT isn't it?!
Anonymous said…
Latest poll has sguil in 1st place with 33% of the votes.
This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project . Each video addresses a topic that I think might be of interest to people trying to understand their network using Zeek and adjacent tools and approaches, like Suricata, Wireshark, and so on. I am especially pleased with Video 6 on monitoring wireless networks . It took me several weeks to research material for this video. I had to buy new hardware and experiment with a Linux distro that I had not used before -- Parrot . Please like and subscribe, and let me know if there is a topic you think might make a good video.
Just what are "tactics"? Introduction MITRE ATT&CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else. The MITRE ATT&CK Design and Philosophy document from March 2020 says the following: At a high-level, ATT&CK is a behavioral model that consists of the following core components: • Tactics, denoting short-term, tactical adversary goals during an attack; • Techniques, describing the means by which adversaries achieve tactical goals; • Sub-techniques, describing more specific means by which adversaries achieve tactical goals at a lower level than techniques; and • Documented adversary usage of techniques, their procedures, and other metadata. My concern is with MITRE's definition of "tactics" as "short-term, tactical adversary goals during an attack," which is oddly recursive. The key word in the tacti
I've completed the TaoSecurity Blog book series . The new book is The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship . It's available now for Kindle , and I'm working on the print edition. I'm running a 50% off promo on Volumes 1-3 on Kindle through midnight 20 April. Take advantage before the prices go back up. I described the new title thus: Go beyond TaoSecurity Blog with this new volume from author Richard Bejtlich. In the first three volumes of the series, Mr. Bejtlich selected and republished the very best entries from 18 years of writing and over 18 million blog views, along with commentaries and additional material. In this title, Mr. Bejtlich collects material that has not been published elsewhere, including articles that are no longer available or are stored in assorted digital or physical archives. Volume 4 offers early white papers that Mr. Bejtlich wrote as a network defender, either for technical or pol
Comments
28% = Acid
17% = Sguil
17% = BASE
Hey, SGUIL is more than just an interface to SNORT isn't it?!