cheat sheet -> https://github.com/corelight/zeek-cheatsheets/blob/master/Corelight-Zeek-Cheatsheets-3.0.4.pdf
docker pull zeek/zeek:latest
docker run -v $(pwd):/mnt -i zeek/zeek sh
zeek -C -r Capture.pcap local
cat ssh.log | zeek-cut client | sort -u
cat ssh.log | zeek-cut id.orig_h | sort | uniq -c | sort -n | sort -u
alias zeek-grep='grep -e "^#" -e'^C
less -S http.log | zeek-cut user_agent | sort | uniq -c | sort -n
wget looks phisy.
cat http.log | zeek-grep Wget | zeek-cut id.orig_h id.resp_h uri user_agent
root@53ef41d5da39:/mnt# cat http.log | zeek-grep Wget | zeek-cut id.orig_h id.resp_h uri user_agent172.31.39.46 13.233.179.35 /PKCampaign/Targets/Forela/Ransomware2_server.zip Wget/1.21.2