a1l4mUnderstanding Threat Actors: How They Infiltrate SystemsHow do Threat Actors and APTs gain access to the system? Even though we have tons of solutions and layers of defense mechanisms.Apr 20Apr 20
a1l4mDLL Persistence AttacksMany attackers employ these techniques to hide in plain sight and evade detection. They utilize completely legitimate processes but inject…Jan 12Jan 12
a1l4mWindows Artifacts: ShimCache. This analysis is crucial for tracing potential attackers within your environment, shedding light on their activities, and enhancing your…Dec 5, 2023Dec 5, 2023
a1l4mCyCtf Finals 2023 Forensics WriteupsHi, this is Khaled Allam, known as “a1l4m”. Recently, we successfully secured 3rd place at the finals of the CyCtf Competition, which was…Nov 23, 20231Nov 23, 20231
a1l4mXpand CTF Forensics WriteupsHi, this is a1l4m, and that is all the forensics challenge writeups for Xpand CTF competition.Oct 14, 20232Oct 14, 20232
a1l4mIntroduction to DFIRWell, to start, it stands for Digital Forensics and Incident Response. This field covers the collection of forensic artifacts from digitalOct 7, 2023Oct 7, 2023
a1l4mBefore Forensicstechnically I know that is not forensics, but I believe it’s essential to know this stuff before starting :”Oct 7, 2023Oct 7, 2023
a1l4mCyberTalents BlueTeam Scholarship CTF WriteupsI had the privilege of participating in an individual Capture The Flag (CTF) event hosted by Cybertalents, wherein I achieved first place…Sep 30, 20231Sep 30, 20231
a1l4mUsing Facebook as a C2 ServerImagine seeing your machine connecting to the Facebook domain. It seems legit, right? Well, maybe most of the time, but not today.Sep 26, 2023Sep 26, 2023
a1l4mCyberDefenders — FalconEye WriteupDCsync | Network | Security | Pass The Hash | SIEM | SplunkSep 3, 20231Sep 3, 20231