LATEST ARTICLES

Wireshark

What is Wireshark?

  What is Wireshark? Wireshark is the most common network protocol analyzer. In addition to being a free and an open source packet following the terms of the GNU General Public License(GPL),...
network pentesting

Pentester Candidate Program – January 2018

Pentester Candidate Program January 2018 On the 6th  of January 2018, Strategic Security will launch the Pentester Candidate Program. This program is designed to satisfy the basic requirements of a penetration tester....
powershell

PowerShell For InfoSec Professionals – September 2017

PowerShell For InfoSec Professionals 2017 The simple fact is if you are going to be attacking or defending modern environments with newer operating systems (Windows 10, Server 2016) – you need Powershell! There is...
Infosec Addicts

CYBERWAR: Advanced Offensive Cyber Operations

cyber Security Offensive Security CYBERWAR: Advanced Offensive Cyber Operations I'm writing this post to let you know that the new night class version of CyberWar: Advanced Offensive Cyber Operations course which is ready to...

Get unlimited classes from InfoSec Addicts

Get unlimited access to all of classes from InfoSec Addicts.   InfoSec Addicts is now offering unlimited access to all of the live-online classes offered each month. Classes like Network Penetration Testing, Web...
pen-testing-tools

Pentester Candidate Program November 2017

Pentester Candidate Program November 2017 On the 18th  of November 2017, Strategic Security/InfoSec Addicts will re-launch the Pentester Candidate Program. This program is designed to satisfy the basic requirements of a penetration...
Burp Suite

Advanced Burp Suite

Burp Suite is one of the most popular web application security testing tools. It has a ton of features and can do everything from intercepting and modifying HTTP requests/responses in real...

Extraction of Cookies in iOS Forensics

Why is it important for an examiner to get some files of interest from an iOS device? All activities of an iOS device user are stored inside the device in different...
ios_forenrics

Analysis of AddressBook and Call History data

Analysis of artifacts on iOS devices Throughout the following paragraphs, I will be going through a discussion about the artifacts on an iOS device and their analysis. This is regardless whether...
ios_partition

SQLite Databases and Plist Files

What about partitions? Partitions are the components on which different data could get stored inside a device. It comes without saying that the mechanisms differ according to the user to specify...
Physical_Acquisition

Physical Acquisition of iOS data

How to acquire iOS data using physical acquisition techniques? Acquiring a bit by bit image of a system is always the best case in favor of someone performing forensics on...
logical_aquation

Logical Acquisition on an iOS device

What are the operating modes of an IOS device? When it comes to iOS forensics it is really an important issue to understand and distinguish between the diverse operating modes...
jail-break

Jail breaking iOS data

How to acquire iOS data through jail breaking? The partition of firmware could be basically replaced with another version of it which is hacked. Through such cool methodology, any desired tools can...
ios_foensics

Important Background of iOS devices before forensics

It is useless to state that iPhones, iPads, and iPods which we use every single second in our life are developed by Apple company and operate on an operating system named...