LATEST ARTICLES

Wireshark

What is Wireshark?

  What is Wireshark? Wireshark is the most common network protocol analyzer. In addition to being a free and an open source packet following the terms of the GNU General Public License(GPL),...
network pentesting

Pentester Candidate Program – January 2018

Pentester Candidate Program January 2018 On the 6th  of January 2018, Strategic Security will launch the Pentester Candidate Program. This program is designed to satisfy the basic requirements of a penetration tester....
powershell

PowerShell For InfoSec Professionals – September 2017

PowerShell For InfoSec Professionals 2017 The simple fact is if you are going to be attacking or defending modern environments with newer operating systems (Windows 10, Server 2016) – you need Powershell! There is...
Infosec Addicts

CYBERWAR: Advanced Offensive Cyber Operations

cyber Security Offensive Security CYBERWAR: Advanced Offensive Cyber Operations - Night Classes I'm writing this post to let you know that the new night class version of CyberWar: Advanced Offensive Cyber Operations course which...

How to be a professional in Mobile Forensics?

Why is mobile forensics important? While technology gets wider and wider and its usage becomes all over the globe, the need of understanding different forms of technology and their effects to...

Getting started with HFS+ file system

Do you know what we mean by HFS+ File System? It is always good to understand an entire system before starting to perform any sort of forensics oThe story Story is...
ios-modes

File System and Operating Modes inside IOS devices

The HFS+ file system in points The disk is formatted in a manner of 512-byte Blocks at the physical level. Two types of blocks exist inside HFS+ file system format. ...
data-tunes

Data Acquisition through iTunes Backup

Why is it important to consider iTunes Backup data for acquisition? Any updates happening towards an iPhone device can be performed using one of two main methods. It is either the user...
ios

Acquiring data from an iOS device

What are Data Acquisition methods in general? An interesting topic to know about in the domain of mobile forensics is data acquisition. But why is it important to get to know about...
Burp Suite

Burp Suite

What is Burp Suite? When it comes to the field of securing web applications, the tool of Burp Suite arises shiningly. PortSwigger Security is the responsible company of producing Burp Suite developed...
ssh-login

OpenSSH-PuTTY-SSH

What is PuTTY? Let's get some background on the topic first of all. PuTTY on its own has no meaning. However, it is a free and open-source software. In fact, it is...
wireless

Kismet Wireless

What is Kismet? It is very important for specialists in the domain of computer security or particularly information security to know about Kismet and what it can do. Fundamentally, Kismet is...
ssh-port

How to understand SSH perfectly?

Throughout the following lines, I will be walking through some of the main steps which have to be essentially followed in order for someone new to the field of security administration...
ssh-secure

How to play around with SSH protocol?

Know what is port forwarding? So, we got to know that to establish a tunnel, port forwarding has to become real. How can this be done? Firstly, port forwarding or as...