What is Wireshark?

  What is Wireshark? Wireshark is the most common network protocol analyzer. In addition to being a free and an open source packet following the...

Pentester Candidate Program – January 2018

Pentester Candidate Program January 2018 On the 6th  of January 2018, Strategic Security will launch the Pentester Candidate Program. This program is designed to satisfy...

PowerShell For InfoSec Professionals – September 2017

PowerShell For InfoSec Professionals 2017 The simple fact is if you are going to be attacking or defending modern environments with newer operating systems (Windows 10,...

CYBERWAR: Advanced Offensive Cyber Operations

cyber Security Offensive Security CYBERWAR: Advanced Offensive Cyber Operations - Night Classes I'm writing this post to let you know that the new night class version of...

How to be a professional in Mobile Forensics?

Why is mobile forensics important? While technology gets wider and wider and its usage becomes all over the globe, the need of understanding different...

Getting started with HFS+ file system

Do you know what we mean by HFS+ File System? It is always good to understand an entire system before starting to perform any...

File System and Operating Modes inside IOS devices

The HFS+ file system in points The disk is formatted in a manner of 512-byte Blocks at the physical level. Two types of...

Data Acquisition through iTunes Backup

Why is it important to consider iTunes Backup data for acquisition? Any updates happening towards an iPhone device can be performed using one of two...

Acquiring data from an iOS device

What are Data Acquisition methods in general? An interesting topic to know about in the domain of mobile forensics is data acquisition. But why is...

Burp Suite

What is Burp Suite? When it comes to the field of securing web applications, the tool of Burp Suite arises shiningly. PortSwigger Security is the...

OpenSSH-PuTTY-SSH

What is PuTTY? Let's get some background on the topic first of all. PuTTY on its own has no meaning. However, it is a free...

Kismet Wireless

What is Kismet? It is very important for specialists in the domain of computer security or particularly information security to know about Kismet and...

How to understand SSH perfectly?

Throughout the following lines, I will be walking through some of the main steps which have to be essentially followed in order for someone...

How to play around with SSH protocol?

Know what is port forwarding? So, we got to know that to establish a tunnel, port forwarding has to become real. How can this...