Understanding Threat Actors: How They Infiltrate SystemsHow do Threat Actors and APTs gain access to the system? Even though we have tons of solutions and layers of defense mechanisms.Apr 20Apr 20
DLL Persistence AttacksMany attackers employ these techniques to hide in plain sight and evade detection. They utilize completely legitimate processes but inject…Jan 12Jan 12
Windows Artifacts: ShimCache. This analysis is crucial for tracing potential attackers within your environment, shedding light on their activities, and enhancing your…Dec 5, 2023Dec 5, 2023
CyCtf Finals 2023 Forensics WriteupsHi, this is Khaled Allam, known as “a1l4m”. Recently, we successfully secured 3rd place at the finals of the CyCtf Competition, which was…Nov 23, 20231Nov 23, 20231
Xpand CTF Forensics WriteupsHi, this is a1l4m, and that is all the forensics challenge writeups for Xpand CTF competition.Oct 14, 20232Oct 14, 20232
Introduction to DFIRWell, to start, it stands for Digital Forensics and Incident Response. This field covers the collection of forensic artifacts from digitalOct 7, 2023Oct 7, 2023
Before Forensicstechnically I know that is not forensics, but I believe it’s essential to know this stuff before starting :”Oct 7, 2023Oct 7, 2023
CyberTalents BlueTeam Scholarship CTF WriteupsI had the privilege of participating in an individual Capture The Flag (CTF) event hosted by Cybertalents, wherein I achieved first place…Sep 30, 20231Sep 30, 20231
Using Facebook as a C2 ServerImagine seeing your machine connecting to the Facebook domain. It seems legit, right? Well, maybe most of the time, but not today.Sep 26, 2023Sep 26, 2023
CyberDefenders — FalconEye WriteupDCsync | Network | Security | Pass The Hash | SIEM | SplunkSep 3, 20231Sep 3, 20231