Zeek
Detecting the new CallStranger UPnP vulnerability with Zeek
By allowing the attacker to essentially force a connection to an arbitrary URL, CallStranger can be used in these three key ways.
By allowing the attacker to essentially force a connection to an arbitrary URL, CallStranger can be used in these three key ways.
Here's why the riskiest part of your Zeek deployment could be you... and how Corelight has got you covered.