{"id":1247,"date":"2022-10-17T04:21:01","date_gmt":"2022-10-17T04:21:01","guid":{"rendered":"https:\/\/sajinshivdas.com\/cybersecurity\/?p=1247"},"modified":"2023-03-27T08:35:02","modified_gmt":"2023-03-27T08:35:02","slug":"the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/","title":{"rendered":"The C2 log visualization tool &#8220;RedEye&#8221; has been released by CISA as open source Tool."},"content":{"rendered":"\n<p>RedEye, an open-source analytic tool for operators to visualize and report C2 activity, was announced by the United States&#8217; Cybersecurity and Infrastructure Security Agency (CISA). Whether you&#8217;re on the &#8220;Red&#8221; or &#8220;Blue&#8221; team, RedEye will help you quickly and easily assess data and make decisions that will have real-world impacts.<\/p>\n\n\n\n<p>CISA and the Pacific Northwest National Laboratory of the Department of Energy collaborated to create RedEye, an open-source analytic tool that helps Red Teams visualize and report command and control activities. In response to a Red Team assessment, an operator can use this tool, which was released in October 2022 on GitHub, to analyze and visualize complex data, assess mitigation strategies, and enable sound decision making. Data from logs, such as those generated by Cobalt Strike, are analyzed and presented in a format that is simple to understand thanks to this tool. Users can then annotate activities they see within the tool with tags and comments. When presenting their findings and workflow to stakeholders, operators can use the RedEye&#8217;s presentation mode.<\/p>\n\n\n\n<p>RedEye can aid a pilot in effectively doing the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Show how the Red Team conducted its assessment in real time, rather than having to sift through thousands of lines of log text.<\/li>\n\n\n\n<li>Ability to visualise and analyse intricate assessment data for sound judgement.<\/li>\n\n\n\n<li>Learn more about the hosts that were compromised and the attack path that was taken during a Red Team assessment or penetration test.<\/li>\n<\/ul>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><mark class=\"has-inline-color has-ast-global-color-1-color\" style=\"background-color: rgba(0, 0, 0, 0);\">Assessing Attack Campaigns<\/mark><\/strong><\/p>\n\n\n\n<p><strong>RedEye Tool &#8211; Campaign Data Upload<\/strong><\/p>\n\n\n\n<p>The tool allows users to upload campaign data to view relevant information such as beacons and commands.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye01-1024x579.webp\" alt=\"\" class=\"wp-image-1248\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><em>RedEye Tool &#8211; Campaign Data Upload<\/em><\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>RedEye Tool &#8211; Campaign Visualization<\/strong><\/p>\n\n\n\n<p>RedEye provides a visual representation of campaign logs over time, which can be used to look for trends between servers and hosts<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye02-1-1024x583.webp\" alt=\"\" class=\"wp-image-1252\"\/><figcaption class=\"wp-element-caption\"><em>RedEye Tool &#8211; campaign visualization<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>RedEye Tool &#8211; Campaign Playback<\/strong><\/p>\n\n\n\n<p>Key events in a campaign can be investigated by analysts in order to learn about payload activity and trace an attacker&#8217;s penetration path, such as lateral movement or the use of credentials to gain administrative access<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye03-1-1024x569.webp\" alt=\"\" class=\"wp-image-1253\"\/><figcaption class=\"wp-element-caption\"><em>RedEye tool &#8211; Campaign Playback<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>RedEye Tool &#8211; Comment and Tags Feature<\/strong><\/p>\n\n\n\n<p>Analysts can collaborate more effectively and gain a deeper understanding of the attack path by using RedEye&#8217;s commenting features to provide feedback on the attacker&#8217;s actions.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye04-1024x580.webp\" alt=\"\" class=\"wp-image-1254\"\/><figcaption class=\"wp-element-caption\"><em>RedEye Tool &#8211; Comment and Tags Feature<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>RedEye tool &#8211; Generate Presentations<\/strong><\/p>\n\n\n\n<p>RedEye also has the ability to generate presentations that can be shared with stakeholders and clients based on the campaign&#8217;s data, including analyst feedback and implementation details. Campaign data and analyst feedback can be exported and shared with clients. RedEye isn&#8217;t just for use by red teams, though; blue teams can use it to better digest assessment data, too, and see where attacks originated, and which hosts were compromised.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye-Hero-Screenshot-1024x683.png\" alt=\"\" class=\"wp-image-1255\" width=\"924\" height=\"616\"\/><figcaption class=\"wp-element-caption\"><em>RedEye tool &#8211; generate presentations<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p>RedEye currently supports analysing Cobalt Strike framework logs. It has been validated on the latest versions of Ubuntu (18+), Kali Linux (2020.1+), macOS (El Capitan+), and Windows (7+).<\/p>\n\n\n\n<p>The tool is available on GitHub, in <a href=\"https:\/\/github.com\/cisagov\/RedEye\/\">CISA\u2019s repository.<\/a><\/p>\n\n\n\n<p>In addition, CISA has published a video that can be accessed via the link below and which provides an overview of RedEye&#8217;s primary features:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Redeye - visualizing Penetration Testing Engagements\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/b_ARIVl4BkQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Among them are Malcom &#8211; a network traffic analysis tool, ICS NPP &#8211; a tool for parsing Industrial Control Systems Network Protocols, Sparrow &#8211; a PowerShell script for detecting possible compromised accounts and apps in Azure and Microsoft 365 environments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RedEye, an open-source analytic tool for operators to visualize and report C2 activity, was announced by the United States&#8217; Cybersecurity and Infrastructure Security Agency (CISA)&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":6348,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,1],"tags":[59,60],"class_list":{"0":"post-1247","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-utilities","9":"tag-cybersecurity-tools","10":"tag-vulnerability-assessment"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The C2 log visualization tool &quot;RedEye&quot; has been released by CISA as open source Tool. - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"RedEye, an open-source analytic tool for operators to visualize and report C2 activity, was announced by the United States&#039; Cybersecurity and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The C2 log visualization tool &quot;RedEye&quot; has been released by CISA as open source Tool. - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"RedEye, an open-source analytic tool for operators to visualize and report C2 activity, was announced by the United States&#039; Cybersecurity and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-17T04:21:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:35:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"892\" \/>\n\t<meta property=\"og:image:height\" content=\"573\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"The C2 log visualization tool &#8220;RedEye&#8221; has been released by CISA as open source Tool.\",\"datePublished\":\"2022-10-17T04:21:01+00:00\",\"dateModified\":\"2023-03-27T08:35:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/\"},\"wordCount\":599,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/RedEye.jpg\",\"keywords\":[\"Cybersecurity Tools\",\"Vulnerability Assessment\"],\"articleSection\":[\"Cyber Security\",\"Utilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/\",\"name\":\"The C2 log visualization tool \\\"RedEye\\\" has been released by CISA as open source Tool. - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/RedEye.jpg\",\"datePublished\":\"2022-10-17T04:21:01+00:00\",\"dateModified\":\"2023-03-27T08:35:02+00:00\",\"description\":\"RedEye, an open-source analytic tool for operators to visualize and report C2 activity, was announced by the United States' Cybersecurity and\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/RedEye.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/RedEye.jpg\",\"width\":892,\"height\":573},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The C2 log visualization tool &#8220;RedEye&#8221; has been released by CISA as open source Tool.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The C2 log visualization tool \"RedEye\" has been released by CISA as open source Tool. - Sajin Shivdas | Cybersecurity","description":"RedEye, an open-source analytic tool for operators to visualize and report C2 activity, was announced by the United States' Cybersecurity and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/","og_locale":"en_US","og_type":"article","og_title":"The C2 log visualization tool \"RedEye\" has been released by CISA as open source Tool. - Sajin Shivdas | Cybersecurity","og_description":"RedEye, an open-source analytic tool for operators to visualize and report C2 activity, was announced by the United States' Cybersecurity and","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2022-10-17T04:21:01+00:00","article_modified_time":"2023-03-27T08:35:02+00:00","og_image":[{"width":892,"height":573,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"The C2 log visualization tool &#8220;RedEye&#8221; has been released by CISA as open source Tool.","datePublished":"2022-10-17T04:21:01+00:00","dateModified":"2023-03-27T08:35:02+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/"},"wordCount":599,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye.jpg","keywords":["Cybersecurity Tools","Vulnerability Assessment"],"articleSection":["Cyber Security","Utilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/","name":"The C2 log visualization tool \"RedEye\" has been released by CISA as open source Tool. - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye.jpg","datePublished":"2022-10-17T04:21:01+00:00","dateModified":"2023-03-27T08:35:02+00:00","description":"RedEye, an open-source analytic tool for operators to visualize and report C2 activity, was announced by the United States' Cybersecurity and","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/10\/RedEye.jpg","width":892,"height":573},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/the-c2-log-visualization-tool-redeye-has-been-released-by-cisa-as-open-source-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"The C2 log visualization tool &#8220;RedEye&#8221; has been released by CISA as open source Tool."}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/1247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=1247"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/1247\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6348"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=1247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=1247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=1247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}