CONVERSION
PCAP TO ZEEK LOGS
Zeek reads a PCAP file and analyzes the raw network traffic to produce structured, high-level logs that describe what actually occurred on the network. Instead of simply displaying packets, Zeek interprets protocols, sessions, and behaviors, extracting meaningful metadata such as connection details, DNS queries, HTTP requests, and potential command-and-control activity. This process effectively transforms packet-level data into Zeek logs that are easier for analysts to search, correlate, and investigate. By converting raw traffic into actionable security context, Zeek enables efficient threat hunting, incident response, and behavior-based analysis without requiring manual packet inspection.
root@dco:~$ zeek readpcap pcaps/AsyncRAT.pcap zeek_logs/asyncrat
Starting the Zeek docker container
Zeek logs will be saved to /home/ubuntu/zeek_logs/asyncrat
root@dco:~$ cd /home/ubuntu/zeek_logs/asyncrat/ && ls
capture_loss.log dns.log http.log known_services.log notice.log packet_filter.log software.log stats.log x509.log
conn.log files.log known_hosts.log loaded_scripts.log ocsp.log reporter.log ssl.log weird.logLast updated