Zeek
Detecting the new CallStranger UPnP vulnerability with Zeek
By allowing the attacker to essentially force a connection to an arbitrary URL, CallStranger can be used in these three key ways.
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
By allowing the attacker to essentially force a connection to an arbitrary URL, CallStranger can be used in these three key ways.
This true story illustrates how Corelight could have assisted with the realization that activity is not suspicious or malicious, but is in fact...