Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to ad... more
FAQs about CyberCode Academy:How many episodes does CyberCode Academy have?The podcast currently has 212 episodes available.
December 10, 2025Course 13 - Network Forensics | Episode 5: TCP/IP Layers, Data Flow, and Network ToolsIn this lesson, you’ll learn about:The fundamentals of protocol analysis and how data flows through network layersThe TCP/IP and OSI networking modelsEncapsulation and decapsulation processesKey Layer 3 and Layer 4 protocolsEssential tools for analyzing network traffic, including Wireshark and Nmap1. Introduction to Protocol Analysis This lesson provides foundational knowledge of how network communications work, focusing on:The structure and behavior of networking modelsHow data moves across a networkHow to use analysis tools to understand packet contentThe lesson contrasts:The TCP/IP Model (4 layers): Application, Transport, Internet, Network AccessThe OSI Model (7 layers), widely used in academic settings for conceptual understanding2. Data Encapsulation and Flow Encapsulation Explained (“Onion” Model) As data travels down the network stack:It starts as the original message (the “core” of the onion)Each layer adds its own headers and sometimes trailersThese layers wrap the message to form a complete network frameLayer-by-Layer WrappingTransport Layer (Layer 4)Adds source/destination ports and TCP flagsInternet Layer (Layer 3)Adds source/destination IP addressesNetwork Access LayerAdds MAC addresses and prepares data for physical transmissionAt the receiving end, layers are removed one by one (decapsulation) until the message reaches the Application Layer. 3. Key Network Layers and Protocols A. Layer 3 – Internet Layer / IP Layer 3 is responsible for addressing and routing. Core FunctionsIdentifying devices using unique IP addressesAdding source/destination IPs to each packetDetermining routing paths across networksIP Addressing ConceptsIP addresses use 4 octets (8 bits each → 0–255)Five IP address classes are defined historicallyPrivate IP ranges include:10.x.x.x172.16.x.x – 172.31.x.x192.168.x.xSubnetting and CIDRSubnet Mask: Similar to a zip code that defines network boundariesCIDR / Slash Notation (e.g., /24, /12) provides flexible subnettingHelps efficiently allocate IP spaceTypes of IP TransmissionUnicast – one-to-oneBroadcast – one-to-everyone on the networkMulticast – one-to-a specific groupB. Layer 4 – Transport Layer / TCP & UDP Layer 4 provides end-to-end communication. TCP (Transmission Control Protocol)Reliable, connection-orientedEnsures order delivery and handles retransmissionsUses the three-way handshake: SYN → SYN-ACK → ACKSession shutdown uses the FIN–ACK processUDP (User Datagram Protocol)Lightweight, connectionlessSuitable for quick bursts of data (e.g., streaming, gaming)Ports and SocketsPorts = “lanes on a highway” for different services (e.g., port 80 for HTTP)Sockets combine IP + Port to identify unique connectionsWorks with both TCP and UDP4. Protocol Analysis Tools A. Wireshark A powerful packet analysis tool used to inspect and dissect network traffic. Key FeaturesCaptures packets (“network sniffing”)Allows deep packet inspectionSupports protocol tree view (mapped to OSI layers)Provides a hex dump showing raw dataWireshark can even reconstruct data streams and extract file content from packet captures. B. Nmap (Network Mapper) A widely used open-source tool for network discovery and service enumeration. What Nmap Can IdentifyPort states (open, closed, filtered)Operating system fingerprintsService versionsNetwork topologyNmap understands both:Traditional subnet masksCIDR notation (e.g., /24, /22)You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more15minPlay
December 09, 2025Course 13 - Network Forensics | Episode 4: Log Analysis, SIM Correlation, and Network Attack Signature DetectionIn this lesson, you’ll learn about:Log analysis fundamentals and why logging is essential for security visibilitySIM (Security Information and Event Management) correlation and event analysisNetwork attack signature detection using tools such as Snort and packet capture analysis1. Introduction to Logging and Security Visibility Effective security monitoring depends on logging the right information and establishing baselines for normal behavior. A common challenge is that security tools—especially IDS sensors—produce many false positives, which can lead analysts to ignore real threats (as seen in major breaches such as Home Depot). 2. Logging Strategy and Log Integrity Logging Strategy Essentials Organizations must implement:A clear logging strategyStructured and normalized log dataCentralized loggingReal-time and continuous monitoringLong-term storage for historical correlationWhat Must Be LoggedUnsuccessful authentication attemptsExample: 100 → 10,000 attempts indicates brute-force or dictionary attacksSuccessful authentication attemptsExample: 1,000 → 20,000 successful logins indicates compromised credentials being reusedMaintaining Log Integrity Logs must be treated like financial ledgers:Log storage must be read-onlyUse hashing to ensure logs are not modifiedUse encryption to protect confidentialityLarge storage capacity is required to retain logs for long-term, low-and-slow attack correlationSyslog is the most common centralized log transport and storage method3. SIM (Security Information and Event Management) Correlation What SIMs Do SIM systems do not store logs; they:Collect and centralize logs from many devices (nodes, routers, switches, appliances)Correlate and analyze eventsProvide near real-time security violation alertsReveal attack patterns that individual log sources might not showLog Sources for SIM Analysis SIMs typically gather logs from:Files (data logs)Operating SystemsNetwork trafficApplicationsAudit Reduction Tools Because audit logs can be massive, tools are used to:Eliminate unnecessary dataFocus analysts on events of significance4. Network Attack Signature Detection Signature detection identifies patterns that indicate malicious activity. Tools such as Snort and packet capture analysis are commonly used. Types of Signatures A. Standard Communication SignaturesICMP ping has a predictable payload (A B C D …)TCP three-way handshake (SYN, SYN-ACK, ACK) helps identify typical connections such as FTP (21) or Telnet (23)B. Reconnaissance ScansPing SweepsEcho requests sent to incrementing IP addressesPort ScansOne source IP sending SYN packets to many ports on one hostModern scanners use non-sequential methodsStealth Scans (used to evade detection)ACK scansSYN stealth scansFIN scans (only FIN flag)NULL scans (no flags)Christmas (Xmas) ScansFlags typically set: FIN, URG, PUSHSnort distinguishes traditional Xmas scans from tools like Nmap (which uses only FUP flags)C. Denial of Service (DoS) AttacksPing of Death – oversized ICMP packetsSYN Flood – large numbers of half-open TCP connections exhausting port capacityD. Trojans and BackdoorsIdentified by traffic on known Trojan portsExample:Netbus → port 12345Back Orifice → port 313375. The Objective of Correlation and Detection The primary goal is to:Detect attack patterns before they completeCombine behavior-based insight with signature-based detectionContinuously update rules and detection logic as threats evolveTools like Snort rely on constantly updated rule sets to stay effective against modern attacks.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more15minPlay
December 08, 2025Course 13 - Network Forensics | Episode 3: Network Forensics, Security Tools, and Defensive ArchitectureIn this lesson, you’ll learn about:The purpose and scope of Network ForensicsKey evidence sources across a networked environmentEssential security tools: scanners, sniffers, IDS/IPSDefensive architecture: firewalls, DMZs, bastion hostsCore security protocols: Kerberos, VPNs, SSH, SSL/TLSIntegrity monitoring and log management systems1. What Is Network Forensics?Network forensics is a branch of digital forensics focused on analyzing network traffic to gather evidence, detect intrusions, and understand attacker behavior.It allows investigators to determine:How an intruder enteredThe intrusion path takenThe techniques usedRequires systematic tracking of inbound/outbound traffic and knowledge of “normal” behavior to spot anomalies.Skilled attackers are harder to trace, but all intruders leave artifacts somewhere.Key Evidence SourcesFirewallsRoutersIDS/IPS systemsPacket sniffersProxy serversAuthentication serversLogs from these devices form the foundation of network investigation.Role of Other ForensicsNetwork forensics complements computer/memory forensics. Examples:Packet analysis may reveal what to look for on a compromised machine.Memory forensics may indicate specific encrypted packets that require deeper analysis.Tools like tcpdump extract raw packet data.Attacker attribution sometimes requires legal processes (e.g., subpoenas to ISPs or Wi-Fi providers).2. Security Tools & OSI Layer WeaknessesThe OSI model helps identify where vulnerabilities exist.Layers 1, 2, 6, and 7 tend to be weaker than layers 3, 4, and 5.Key Security ToolsPort ScannersIdentify open ports and exposed services.Example: Nmap.Packet Sniffers / AnalyzersWireshark (analyzer that can sniff)tcpdump (pure command-line sniffer)Intrusion Detection Systems (IDS)Example: Snort.Works like a sniffer with rules; alerts on malicious patterns.Intrusion Prevention Systems (IPS)Active responses: modify packets, block ports, shut down segments.Must be configured carefully to avoid accidental denial-of-service events.3. Defensive Network Architecture FirewallsHardware + software systems controlling access based on packet characteristics.Types of FirewallsPacket Filtering (Layer 3)Early model, examines only IP and port.Does not track session state.Stateful Firewalls (Layer 4)Track session state and connection flows.Prevent forged packets unless the session was legitimately initiated.Application-Layer Firewalls (Layers 6–7)Deep packet inspection.Can enforce command-level rules (e.g., allow FTP GET but block FTP PUT).DMZ (Demilitarized Zone)A network segment between internal LAN and the external internet.Hosts public-facing resources (web, mail servers).Bastion HostHardened system placed in the untrusted network zone (DMZ).Common examples: web servers, mail servers.4. Authentication, Encryption & Secure Protocols Kerberos (SSO Authentication)A trusted third-party authentication system.Uses a ticket-granting server to authenticate:Client → Kerberos → Resource (e.g., printer)Commonly used for Single Sign-On.VPNs (Virtual Private Networks)Encrypt traffic between two endpoints.Important note: VPNs do not create isolated physical paths; they still traverse the same routers.Encryption layers:Layer 2 → L2TPLayer 3 → IPSecLayers 5–7 → SSL/TLSPurpose: privacy, not magical invisibility.SSH (Secure Shell)Commonly used for encrypted remote access, tunneling, and file transfer.Operates on port 22.SSL/TLS Process A hybrid crypto model:Browser creates a secret session key.Browser encrypts this key using the server’s public key.Server decrypts it using its private key.Both sides now share the secret and switch to symmetric encryption for the session.5. File Integrity & Log Management File Integrity CheckingTools like Tripwire monitor critical files.Use hashing to detect unauthorized changes.Alerts admins when files are modified.Log Management & SIEMSIEM solutions combine:Security Information Management (SIM)Security Event Management (SEM)Examples: LogRhythm, Splunk.Aggregate logs from across the environment, correlate events, and identify patterns.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more17minPlay
December 07, 2025Course 13 - Network Forensics | Episode 2: Architecture, Protocols (TCP/UDP), and Evidentiary ValueIn this lesson, you’ll learn about:Core networking architectures and componentsThe evidentiary value of network design for forensic investigationsMAC vs. IP addressing, IPv4 vs. IPv6Ports, protocols, and how systems communicateTCP (reliable) vs. UDP (unreliable) communicationEssential protocols: ICMP, DHCP, DNS1. Networking Architecture & Its Forensic ImportanceNetwork forensics requires a solid understanding of how networks operate.The Internet is defined as a collection of interconnected networks using internet protocols to exchange messages.Key network types:LAN – Local Area NetworkWAN – Wide Area NetworkCAN – Campus Area NetworkMAN – Metropolitan Area NetworkDMZ (Demilitarized Zone):Positioned between the internal LAN and the internet.Hosts publicly accessible systems (web servers, mail servers).A critical zone for forensic evidence.Evidentiary Value Across the Architecture When an attacker moves from the internet → DMZ → internal network, evidence is left in multiple locations, including:Point of originRouters across the internetISP-facing routerFirewallsDMZ switching infrastructureThe compromised serverUnderstanding these layers allows investigators to reconstruct attacker movement.2. Network Components, Addressing & Infrastructure Network ComponentsTransmission media: cables, fiber, wirelessNICs (Network Interface Cards)Nodes (any device connected to the network)MAC vs. IP AddressesMAC AddressLayer 2Physical/hardware identifierTypically permanentIP AddressLayer 3Logical/virtualChanges frequently depending on networkIPv4 vs. IPv6IPv4 → 32-bit addressingIPv6 → 128-bit addressing with IPSec built in (encryption/authentication)Public vs. Private AddressingPublic = Routable on the internetPrivate = Non-routable (internal networks)NAT (Network Address Translation) is used to map internal private IPs to a public-facing address.IP Address ClassesClass AClass BClass CClass E (experimental)3. Ports & Communication Protocols PortsThink of ports as "traffic lanes" used for communication.Total: 65,535 ports1–1024 → Well-known ports1025+ → Ephemeral or dynamic portsServices (Windows) / Daemons (Linux) bind to these ports.ProtocolsProtocols define communication rules between systems.Governed by RFCs (Request for Comments) standards.4. TCP – The Reliable Protocol Key TCP Header ElementsSource portDestination portSequence numberFlagsConnection ManagementThree-Way Handshake (Start of session)SYN → SYN/ACK → ACKFour-Way Combo (End of session)FIN/ACK → ACK → FIN/ACK → ACKTotal overhead: 7 packets for a complete start + close cycle.Important TCP FlagsUrgent Pointer – Marks urgent/priority dataPush (PSH) – Forces buffered data to transmit immediatelyReset (RST) – Abruptly closes a sessionTCP is reliable because it ensures ordered, confirmed delivery. 5. UDP – The Unreliable ProtocolConnectionless, no handshake.Faster, lower overhead.Ideal for short or time-sensitive bursts of data.Common uses:DNS queriesAudio/video streamingVoIPUDP does not guarantee delivery, order, or error correction. 6. Other Essential Protocols ICMP (Internet Control Message Protocol)Used for error reporting and network diagnostics.Helps identify optimal routing paths.DHCP (Dynamic Host Configuration Protocol)Automatically assigns IP addresses, subnet masks, and gateways to clients.DNS (Domain Name System)Translates human-friendly domain names into IP addresses.Essential for both internal and external connectivity.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more16minPlay
December 06, 2025Course 13 - Network Forensics | Episode 1: Fundamentals, Attack Vectors, and Digital TracingIn this lesson, you’ll learn about: Network Forensics – Key Concepts and Techniques In this lesson, you’ll learn about:The fundamentals of networks and physical security risksCommon network attack vectors and exploitation techniquesCritical protocols, encryption methods, and anonymity technologiesEssential tools and methodologies used in network forensic investigations1. Network Fundamentals & Physical SecurityUnderstanding how networks operate is essential for forensic analysis.Physical access = high riskCoax-based networks are insecure.Wiring closets and data closets are prime targets.Example: An MIT associate once accessed a wiring closet, deployed a server, and was only detected via CCTV.Network devices by OSI layer:Hub → Layer 1 repeaterSwitch → Layer 2 (MAC-based)Router → Layer 3Firewall → Layer 4 (TCP/UDP port filtering)NAT ("poor man's proxy")Multiple internal IPs share one external IP.NAT blocks inbound attacks but is bypassed when an infected internal system creates an outbound tunnel.2. Attack Vectors and Network Exploits Wireless as a major weaknessWireless signals broadcast publicly, making them easy to attack.Deauthentication attacks can be launched with cheap hardware (e.g., ESP8266 boards for $20-$25).Core attack techniquesMAC SpoofingMAC addresses can be changed easily (e.g., using macchanger).Investigators look for activity stopping on one MAC/IP and continuing on another.Tracking spoofed devices typically requires WIPS and triangulation.ARP Poisoning & MAC FloodingARP poisoning redirects traffic by impersonating the gateway.MAC flooding forces switches to behave like hubs.Port security can mitigate these attacks.DNS PoisoningRedirects a domain to an attacker-controlled IP.Local host files can be manipulated (e.g., domain → 127.0.0.1).TCP/IP SpoofingEffective spoofing requires MITM positioning to block reset packets.Blind spoofing is used in large-scale DoS to confuse IDS systems.3. Protocols, Encryption & AnonymitySecure vs. insecure protocols:SSH (22) replaced Telnet (23).FTP sends credentials in plaintext.SNMP (161/162) must never be exposed externally due to sensitive config data.Malware ports commonly observed:666, 1337, 12345, 54321, 4444, 5555.IPv6 & IPSec:IPv6 often uses IPSec, enabling point-to-point encrypted traffic that is difficult to intercept or spoof.Tor and onion routing:Uses three layers of encryption across multiple nodes.Nearly impossible for a basic investigator to break.Only encrypted inside the Tor network—exit node traffic to non-HTTPS sites is exposed.4. Forensic Tools & Investigation Methodology Log-Based InvestigationExternal attacks rely on:Router logsFirewall logsIDS logsInternal attacks rely on logs from internal devices and systems.Key ToolsSecurity Information Management Systems (SIMS)Aggregate logs from thousands of sources.Normalize data and identify correlated attack patterns.Packet Sniffers & Protocol AnalyzersWireshark captures Layer 2 traffic.“Follow stream” helps isolate conversations and manually carve data.NetstatShows open ports and active network connections.Not forensically sound on original evidence—should be used only on a copy or VM.Timestamp SynchronizationTimestamps are critical for correlating logs.All systems should sync to a trusted NTP server.If timestamps differ, investigators must calculate and apply the correct offset.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more14minPlay
December 05, 2025Course 12 - Maltego Advanced Course | Episode 4: Custom Entity Design and Implementation in MaltegoIn this lesson, you’ll learn about:How to create custom entities in MaltegoHow to name entities and assign unique type IDsHow entity properties, main properties, and data types workHow inheritance allows new entities to reuse transformsHow to use advanced features like calculated properties and visual overlaysHow to build dynamic, visually adaptive entities for specialized investigationsSummary of the Episode: This episode walks through the full process of designing and implementing custom entities in Maltego, beginning with basic creation and advancing toward powerful features like inheritance, calculated properties, regex parsing, and dynamic icon overlays. It demonstrates how users can tailor Maltego to fit specialized investigation workflows by defining their own data structures and visual representations. 1. Naming and Identifying Custom Entities Creating a custom entity starts with two essential identifiers: Display NameA human-readable name, such as Worker, that appears in the graph.Type ID (Unique Identifier)Must be globally unique to avoid conflictsTypically structured with a namespace, e.g.:investitech.worker (organization format)my.worker (personal or training use)2. Creating a Basic Custom Entity To create a minimal entity, define:Display name: e.g., workerShort description: Explains its purposeUnique type ID: e.g., my.workerCategory: e.g., personalMain Property Every entity requires at least one property.Example:Property name: worker nameType: stringSample value: John DoeThe main property appears in bold in the property list and typically identifies the entity on the graph. 3. Using Entity Inheritance Inheritance allows a new entity to reuse all transforms and properties of an existing one. Examples:Website inherits from DNS name to gain transforms like “To IP address”.A custom worker entity inherits from maltego.person to reuse:First/last name propertiesPerson-related transformsThis makes the new entity more functional without additional configuration. 4. Additional Properties Custom entities can include any number of extra properties. Property types include:StringsNumbersDatesBooleansImagesLocationsDefault vs Sample ValuesSample value: Appears when dragging the entity from the paletteDefault value: Used if the property is left empty5. Calculated Properties Calculated properties automatically combine or transform other property values. Common annotations:$property(name): Reference another property$trim(): Remove surrounding whitespaceExample:A full name property combining first and last names. Calculated properties can be:VisibleHiddenRead-only (evidence-safe)6. Display Settings & Overlays Maltego entities can display visual cues based on their property values. Large Image (Icon)Can be chosen dynamically using a calculated propertyOverlays (5 Positions)NorthNorthwestWestSouthwestSouthOverlays can show:ImagesColorsText (e.g., job titles, statuses, labels)This gives investigators a quick visual read of key details without inspecting the property panel. 7. Regular Expressions for Parsing Regular expressions help:Automatically match input values to the correct entity typeExtract structured data from plain textExample:Splitting "40.7128 -74.0060" into latitude/longitude values.8. Advanced Example: The Custom Worker Entity The episode demonstrates a feature-rich worker entity: InheritanceInherits from maltego.personAdditional Propertiesgenderskin tonejobCalculated PropertyA hidden, read-only property called combined:gender_skintone_jobUsed to determine the icon dynamically. Dynamic AppearanceLarge icon changes based on the combined property valueJob title appears as a north overlayThis showcases how custom entities can visually adapt according to their data—ideal for specialized investigative environments. Conclusion By mastering custom entity design, inheritance, calculated properties, regex parsing, and graphical overlays, investigators can transform Maltego into a fully customized platform that models the exact data structures relevant to their cases.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more15minPlay
December 04, 2025Course 12 - Maltego Advanced Course | Episode 3: The Maltego Transform Hub: Finding, Installing, and Utilizing Data IntegrationsIn this lesson, you’ll learn about:What Hub Items are and how they expand MaltegoHow to navigate, search, filter, and evaluate items in the Transform HubPricing models and key requirements used by Maltego data partnersHow to install free, paid, and trial integrationsHow to learn and understand newly installed transforms using documentation and the Transform ManagerSummary of the Episode: This episode provides a full walkthrough of Maltego’s Transform Hub, explaining how investigators can expand Maltego with external data integrations known as hub items. It covers the categories of integrations available, how to browse and install them, the pricing models used by different data sources, and the tools within Maltego that help users understand and effectively use newly added transforms. 1. Understanding Hub Items Maltego is powerful on its own, but it becomes dramatically more capable when combined with external data sources. These integrations are called hub items, and they can introduce:New transformsNew entitiesMachinesTransform setsCustom viewsIconsHub items come from both partners and the community. Detailed information about all integrations is available on Maltego’s website under the “Data Sources” section. 2. Navigating the Transform Hub The Transform Hub is the central interface for adding new capabilities to Maltego. Key UI FeaturesCan be toggled on/off from the Home tabSupports viewing all, installed, or uninstalled itemsIncludes sorting and search functionalitySearch accepts keywords (e.g., “dark web”, “email”, “financial data”)Offers filters based on:Data categoryPricing modelRelevant investigation typesEach hub item displays:IconNameMaintainerShort summaryClicking the item opens a detailed view. 3. Inspecting Hub Item Details & Pricing The details page helps users understand the integration, including:Full descriptionTagsLinks to documentationPricing modelContact detailsSupported Pricing ModelsBring Your Own Key (BYOK)User buys an API key from the providerData BundleIncluded in certain Maltego subscription plansFreeNo payment or key requiredTrialLimited free usageTypically rate-limited per hour or per dayPaid ConnectorRequires provider key + Maltego connector feeMultiple models can apply to the same hub item. 4. Installing Hub Items Installation steps depend on the pricing model. 1. Free Hub ItemsHover → Click InstallConfirmMaltego downloads all resourcesInstallation summary lists added transforms, entities, etc.2. Key Required Up FrontClicking Install immediately prompts for a keyDetails page shows contact information for obtaining a key3. Free Trial ItemsInstalls without requiring a keyWhen trial limits are reached, Maltego displays a warningA key can be added later via:Transform Hub → Hub Item → Settings5. Learning How to Use New Integrations After installing a hub item, users must determine how its transforms work and which entities they apply to. Three main learning resources: 1. Online Documentation Includes:White papersShowcasesSolution briefsBlog postsExamplesMany hub item detail pages link directly to these resources. 2. Details Page Inside the Transform Hub Provides:Summary of capabilitiesTagsDescriptionLinks to support or documentation3. Transform Manager (Most Technical & Useful) Accessible via:Transform Tab → Transform Manager Inside the Transform Manager, users can explore:Transform Servers tabShows all transforms from each data providerIncludes transform namesFull descriptionRequired input entity typeHelps determine how to start using the transformAll Transforms tabUnified list of every installed transformTransform Sets tabShows how transforms are grouped into setsHelpful for understanding logical groupings created by the hub itemThis is the primary tool for technically understanding a new integration.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
December 03, 2025Course 12 - Maltego Advanced Course | Episode 2: Maltego Infrastructure Entities, Transforms, and Footprinting TechniquesIn this lesson, you’ll learn about:The core entities used in Maltego infrastructure investigationsHow transforms connect Domains, DNS names, IPs, Netblocks, and ASNsThe methodology of Level 1, L2, L3, and XL infrastructure footprintingKey transforms for pivoting forwards and backwards in infrastructure graphsThe difference between live DNS, passive DNS, and specialized DNS transformsSummary of the Episode: This episode provides a structured introduction to infrastructure investigations in Maltego, covering the foundational entities, essential transforms, and the systematic methods used for infrastructure footprinting. It explains how domains, DNS names, IP addresses, Netblocks, and Autonomous Systems interrelate, and how transforms allow analysts to map and attribute online infrastructure. 1. Foundational Entities & Core Concepts Infrastructure investigations rely on a small set of critical entities: Key EntitiesDomainPublic-facing resourceCommon starting point for discovering related DNS namesDNS Name (and variants like Website, NS, MX)Represents a system that can resolve to an IP addressOften a gateway to other infrastructureIPv4 AddressA central pivot point in investigationsEven on shared hosting, IPs remain strong identifiersNetblockA range of IP addressesUseful for clustering infrastructure and linking disparate nodesAutonomous System (AS / ASN)Represents routing ownership over NetblocksUseful for identifying ISPs or large organizationsOther Useful EntitiesEmail Address — often the strongest pivot in broader investigationsPort & Service — show server capabilities (SSH, RDP, HTTP, etc.)Tracking Code — connects different websites to the same operator2. Core Infrastructure Transforms The episode divides standard Maltego infrastructure transforms into functional groups. 1. Domain → DNS Name Methods used:To Website (Quick Lookup) — checks common “www” A/AAAA recordsTo Website Using Domain (Bing) — broader search engine discoveryPassive DNS (Robtex/Robex) — historic DNS relationshipsSPF Transform — extracts DNS names and IPs from email policies2. DNS Name → IP AddressTo IP AddressResolves any DNS name to its current IP3. IP Address → Netblock / ASN Transforms use:Historic Passive DNSGlobal routing dataWHOIS sources (ARIN, RIPE, APNIC, etc.)Important transforms:Using Natural Boundaries — creates typical /24 IP rangesTo AS Number — gets ASN from the Robex databaseTo Company Owner — retrieves organization ownership & location3. Footprinting Methodology Infrastructure footprinting is a repeatable process across industries. Level 1 Footprinting (L1) Example shown using CIA.gov Steps:Find all DNS names / Websites for the domainResolve all DNS names → IP addressesCluster IPs → Netblocks (often with natural boundaries)Run To AS Number on the NetblocksExtract ownership using To Company OwnerThis reveals which Netblocks actually belong to the organization and allows deeper exploration (e.g., Wikipedia edits from those IPs). Higher-Level Footprinting L2 & L3 MachinesAdd more depthUse Reverse DNS (PTR lookups)Provide prompts to filter MX/NS resultsReveal additional infrastructure through recursive pivotsXL FootprintUses a completely different strategyHeavy focus on reverse DNS on name servers and SPF-derived IPsRequires significant system resourcesMost thorough automated footprint4. Pivoting Techniques Pivoting is how analysts move through an investigation graph. Forward Pivot Domain → DNS Name → IP Address → Netblock → ASN Backward Pivot IP Address → Historic DNS Names → Domains → Tracking CodesUsed to uncover:Hidden assetsLegacy systemsConnected infrastructures5. DNS Transform Distinctions Two commonly confused transforms: To Website Mentioning DomainBroad search for any website that references the domainGood for OSINT, not for footprintingTo Website Using DomainReturns websites that end with your domainIdeal for discovering all related organizational websitesLive vs Passive DNSReverse DNS (PTR) = current dataPassive DNS (Robex/Robtex) = historic and may show old mappingsMaltego displays these as dotted linksYou can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more17minPlay
December 02, 2025Course 12 - Maltego Advanced Course | Episode 1: Maltiggo Transforms, Sets, and Essential Menu ActionsIn this lesson, you’ll learn about:How transforms work in MaltegoTransform sets and how they organize large transform collectionsKey transform menu actions and shortcutsEssential bottom-row menu actions for efficient workflowSummary of the Episode: This episode explains the core mechanics of Maltego transforms, how to run them, how they are organized, and the essential menu actions available when working on a graph. 1. Understanding TransformsTransforms are functions that take one or more selected entities as input.They only appear if relevant entity types are selected.Transforms can be run in two ways:Through the right-click transform menu on the graphThrough the Run View2. Transform Sets Because some entities (like Domain) have very long lists of transforms, Maltego organizes them into transform sets.Transform sets help users find transforms more easily.Sets and transforms are grouped first by their hub item, which may introduce new transforms (e.g., Thread Miner included by default).Navigation:Click a group or set to see its contentsUse the left bar or right-click → Up to go back a level3. Recognizing Items in the Transform ListTransformsDark background (near-black)Single play icon ▶Groups/SetsLight backgroundSmall plus icon ➕Run All in a SetDouble-play icon ▶▶Use with caution due to potentially large output4. Special Transform SetsAllAppears on every levelShows all transforms for the selected entity/entitiesFavoritesOnly appears if you starred transforms for the current entity typeMachinesAppears at the topmost level, at the bottomShortcut to run Maltego Machines5. Customizing Your Transform ExperienceUsers can create custom transform sets in the Transform Manager.Hub items can add new transform groups to your environment.6. Essential Right-Click Menu Actions (Bottom Row) These are shortcuts to functions available elsewhere in Maltego: Basic ActionsDelete / Cut / CopyCopy sends entity as GraphML to clipboardCan be pasted into another graphType ActionsQuickly search the entity value in Google or WikipediaUsed rarelySend to URLSends selected entities to a custom HTTP POST endpointClear / Refresh ImagesReloads images from original sourcesWorks only in normal privacy mode, not stealth modeCopy to New GraphCreates a brand-new graph containing the selected entities and their linksUseful for:ExperimentationIsolating parts of a graphYou can later copy results back into the original graphChange TypeConverts entity from one type to another (e.g., DNS name → Website)Crucial when the target transform isn’t available for the current typeMergeCombines two entities that represent the same real-world objectConsolidates their linksAttachAdds files (evidence, screenshots, etc.) to an entityAttached images can be displayed on the graph instead of the entity icon7. Most Important Actions to RememberCopy to New GraphChange TypeMergeAttachThese actions significantly improve workflow efficiency and flexibility when working with complex investigations.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more12minPlay
December 01, 2025Course 11 - Mobile Forensics Fundamentals | Episode 3: iOS and iPhone Forensics: Security, Acquisition Techniques, and Artifact AnalysisIn this lesson, you’ll learn about: • iOS architecture and security features • Common vulnerabilities and exploit history • Logical and physical acquisition techniques • Key forensic artifacts and analysis methods • Legal constraints and investigative limitations iOS / iPhone Forensics: Summary and Key Concepts 1. iOS Security and Architecture iOS is its own complete operating system and is generally considered more secure than Android due to its standardized hardware/software ecosystem. Any vulnerability or exploit tends to apply consistently across devices, but Apple rapidly patches these issues. iOS architecture is layered, similar to the OSI model:Core OS – Unix-based kernel, security framework, low-level networking.Core Services – TCP/IP communication, iCloud services, file sharing.Media Layer – Audio, graphics, video processing.Cocoa Touch – Application interface layer.The file system historically used HFS+, storing data in a B-tree format. Key iOS Security FeaturesSecure Boot ChainVerifies every boot stage using Apple’s root certificate. Prevents downgrades and protects against boot-level attacks.Secure Enclave / “Clave”A dedicated co-processor using encrypted memory to handle cryptographic keys, making memory dumps extremely difficult.AES-256 EncryptionIndustry-grade (DoD-level) encryption applied at the hardware level to protect user partitions.ASLR (Address Space Layout Randomization)Mitigates buffer overflow attacks by randomizing memory locations.Sandboxing / JailingRestricts app access to only their assigned directory, protecting system resources.2. Vulnerabilities and Exploit History While secure, iOS has had notable vulnerabilities:Masquerading AttackA malicious app with the same internal project name as a legitimate one could overwrite it without signature validation (older versions).IP Box ExploitAllowed brute-forcing on older iOS versions by bypassing lockout delays.GrayKey Unlocking DeviceA proprietary law-enforcement tool used to bypass locks; Apple later patched the underlying vulnerabilities.San Bernardino CaseFBI paid roughly $1M for a one-time exploit to bypass auto-wipe on a locked iPhone.Apple consistently patches publicly disclosed vulnerabilities, reducing the lifespan of exploits. 3. Acquisition Techniques and Challenges 1. Logical Acquisition Often performed through iTunes backups.Requires the device to be unlocked.Extracts app data, device configuration, file structure, communications, and certain system logs.Tools include:Paraben Device SeizureXRYCellebrite (UFED)iTunes Backup Analyzer 2 (IPBA2)2. Physical Acquisition Attempts to extract raw data, including deleted and unallocated space. However:Modern iOS with full AES-256 encryption makes physical acquisition impossible without the passcode.Often requires a temporary jailbreak or custom exploit.Tools such as Pangu or custom RAM disks may be used on older versions.Recovery/Boot Modes Used in ForensicsRecovery Mode – Useful for interacting with the firmware and restoring images.DFU Mode – Lower-level access used to load custom tools or initiate exploit chains.4. Key Forensic Artifacts and Evidence Sources Plist (Property List) Files Store structured data such as:IMEI, IMSI, ICCIDDevice GUIDBackup detailsEncryption flagsPlists are among the most valuable forensic artifacts.Timestamps iOS uses Unix Epoch time (seconds since Jan 1, 1970).Investigators examine:MAC times (Modified, Accessed, Created)Irregularities (e.g., zeroed milliseconds) that may indicate tampering.Location DataHistorically stored indefinitely; now encrypted and retained for ~8 days.Still useful for reconstructing user movement.CommunicationsContactsSMS/iMessage databasesCall history (including missed/attempted calls)VoicemailsNote: Listening to an unheard original voicemail may violate wiretap laws.Browser Artifacts (Safari)BookmarksCacheSearch history“Suspend state list”—recently closed tabs and windowsEphemeral DataClipboard contentsDynamic keyboard cacheOften contains usernames, passwords, or search terms.Image and Media Data (DCIM)Photos/videos include EXIF metadata (sometimes GPS).Deleted images may remain accessible as thumbnails embedded in databases.Network ArtifactsWi-Fi Plist files contain auto-join network information, including BSSIDs.Can establish proximity between suspects/devices.5. Legal and Procedural Requirements Investigators must remain strictly within legal authorization scopes:Accessing iCloud or any cloud-stored user data requires separate warrants.Overstepping authority can end a forensic career immediately.Under the Plain View Doctrine, unrelated evidence may be reported as long as the investigator stays within the allowed scope of the warrant.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more17minPlay
FAQs about CyberCode Academy:How many episodes does CyberCode Academy have?The podcast currently has 212 episodes available.