<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Suricata on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/suricata/</link><description>Recent content in Suricata on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Tue, 07 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/suricata/index.xml" rel="self" type="application/rss+xml"/><item><title>Splunk-NerisBot</title><link>https://hexpysya.github.io/blue_team/splunk-nerisbot/</link><pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/splunk-nerisbot/</guid><description>A victim host downloaded multiple malicious executables via HTTP, including Emotet, ransomware, and trojan payloads, detected through Suricata IDS alerts and confirmed malicious via VirusTotal.</description></item><item><title>Wazuh + Suricata: Malware traffic</title><link>https://hexpysya.github.io/blue_team/wazuh+suricata-malware-traffic/</link><pubDate>Mon, 02 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/wazuh+suricata-malware-traffic/</guid><description>Replayed a malicious PCAP file containing Hancitor dropper traffic that deployed Cobalt Strike, Dridex, and Ficker Stealer. Analyzed 423 Suricata alerts in Wazuh, reconstructed the full infection chain, and mapped findings to MITRE ATT&amp;amp;CK.</description></item></channel></rss>