UA-90624906-1

What is Wireshark?

  What is Wireshark? Wireshark is the most common network protocol analyzer. In addition to being a free and an open source packet following the...

Pentester Candidate Program – January 2018

Pentester Candidate Program January 2018 On the 6th  of January 2018, Strategic Security will launch the Pentester Candidate Program. This program is designed to satisfy...

PowerShell For InfoSec Professionals

PowerShell For InfoSec Professionals 2017 The simple fact is if you are going to be attacking or defending modern environments with newer operating systems (Windows 10,...

CYBERWAR: Advanced Offensive Cyber Operations

cyber Security Offensive Security CYBERWAR: Advanced Offensive Cyber Operations I'm writing this post to let you know that the new night class version of CyberWar: Advanced Offensive...

Get unlimited classes from InfoSec Addicts

Get unlimited access to all of classes from InfoSec Addicts.   InfoSec Addicts is now offering unlimited access to all of the live-online classes offered each...

Pentester Candidate Program November 2017

Pentester Candidate Program November 2017 On the 18th  of November 2017, Strategic Security/InfoSec Addicts will re-launch the Pentester Candidate Program. This program is designed to...

Advanced Burp Suite

Burp Suite is one of the most popular web application security testing tools. It has a ton of features and can do everything from...

Extraction of Cookies in iOS Forensics

Why is it important for an examiner to get some files of interest from an iOS device? All activities of an iOS device user...

Analysis of AddressBook and Call History data

Analysis of artifacts on iOS devices Throughout the following paragraphs, I will be going through a discussion about the artifacts on an iOS device...

SQLite Databases and Plist Files

What about partitions? Partitions are the components on which different data could get stored inside a device. It comes without saying that the mechanisms...

Physical Acquisition of iOS data

How to acquire iOS data using physical acquisition techniques? Acquiring a bit by bit image of a system is always the best case...

Logical Acquisition on an iOS device

What are the operating modes of an IOS device? When it comes to iOS forensics it is really an important issue to understand...

Jail breaking iOS data

How to acquire iOS data through jail breaking? The partition of firmware could be basically replaced with another version of it which is hacked. Through...

Important Background of iOS devices before forensics

It is useless to state that iPhones, iPads, and iPods which we use every single second in our life are developed by Apple company...