Hello! I am an intermediate zeek user. I would like a walk-through on how i can use zeek to detect different types of attacks such as sql injection, ddos, man in the middle attacks and the likes. Thanks. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mailman.ICSI.Berkeley.EDU/pipermail/zeek/attachments/20191023/4c8a76ed/attachment.html