UA-90624906-1

What is Wireshark?

  What is Wireshark? Wireshark is the most common network protocol analyzer. In addition to being a free and an open source packet following the...

Pentester Candidate Program – January 2018

Pentester Candidate Program January 2018 On the 6th  of January 2018, Strategic Security will launch the Pentester Candidate Program. This program is designed to satisfy...

PowerShell For InfoSec Professionals

PowerShell For InfoSec Professionals 2017 The simple fact is if you are going to be attacking or defending modern environments with newer operating systems (Windows 10,...

CYBERWAR: Advanced Offensive Cyber Operations

cyber Security Offensive Security CYBERWAR: Advanced Offensive Cyber Operations I'm writing this post to let you know that the new night class version of CyberWar: Advanced Offensive...

Advanced Threat Hunting with Splunk

Advanced Threat Hunting Advanced Threat Hunting with Splunk - When it comes to log analysis Splunk is one the most popular enterprise-grade solutions in the...

Get Unlimited Classes from InfoSec Addicts

InfoSec Addicts is now offering Unlimited Classes access to all of the live-online classes offered each month. Classes like Network Penetration Testing, Web Application...

Pentester Candidate Program November 2017

Pentester Candidate Program November 2017 On Saturday the 18th  of November 2017, Strategic Security/InfoSec Addicts relaunched the Pentester Candidate Program. This program is designed to satisfy...

Advanced Burp Suite

Burp Suite is one of the most popular web application security testing tools. It has a ton of features and can do everything from...

Extraction of Cookies in iOS Forensics

Why is it essential for an examiner to get some files of interest from an iOS device?All activities of an iOS device user...

Extraction of applications,photos,passwords – iOS forensics

What are the files of interest in the first place?Extraction of applications,photos,passwords - iOS forensics - There are several directories that one...

Artifacts of an IOS device

plist file:This important file is located inside the folder of the root application. Important information about the device of interest may be...

Analysis of AddressBook and Call History data

Analysis of artifacts on iOS devicesThroughout the following paragraphs, I will be going through a discussion about the artifacts on an iOS device...

SQLite Databases and Plist Files

What about partitions?Partitions are the components on which different data could get stored inside a device. It comes without saying that the mechanisms...

Physical Acquisition of iOS data

How to acquire iOS data using physical acquisition techniques?Acquiring a bit by bit image of a system is always the best case...