Network Forensics with Brim (zui)

Brim and Zui are powerful tools for analyzing large-scale network traffic, especially when working with Zeek logs. They allow you to search and filter data efficiently with commands or queries tailored to your investigation needs. Below, I provide commands and approaches for each section from above, tailored for Brim/Zui.

filter protocals

_path==http
_path==ssh
_path==ssh
_path==telnet
_path==files
_path==conne
_path==icmp
_path==smb2
_path==smb
_path==ftp
_path==kerberos
_path==ldap

IP Filters

_path=conn id.orig_h=192.168.1.1 or id.resp_h=192.168.1.1 : To capture all traffic from or to a specific IP
_path=conn id.orig_h= :  Source IP 
_path=conn id.resp_h= : Destination IP

Port-Based Filters

Filter for HTTP Requests

DNS Traffic Filter

Searching for File Uploads

Kerberos Traffic

LDAP Traffic

Filters

Last updated