a1l4mUnderstanding Threat Actors: How They Infiltrate SystemsHow do Threat Actors and APTs gain access to the system? Even though we have tons of solutions and layers of defense mechanisms.8 min read·Apr 20, 2024----
a1l4mDLL Persistence AttacksMany attackers employ these techniques to hide in plain sight and evade detection. They utilize completely legitimate processes but inject…5 min read·Jan 12, 2024----
a1l4mWindows Artifacts: ShimCache. This analysis is crucial for tracing potential attackers within your environment, shedding light on their activities, and enhancing your…5 min read·Dec 5, 2023----
a1l4mCyCtf Finals 2023 Forensics WriteupsHi, this is Khaled Allam, known as “a1l4m”. Recently, we successfully secured 3rd place at the finals of the CyCtf Competition, which was…7 min read·Nov 23, 2023--1--1
a1l4mXpand CTF Forensics WriteupsHi, this is a1l4m, and that is all the forensics challenge writeups for Xpand CTF competition.5 min read·Oct 14, 2023--2--2
a1l4mIntroduction to DFIRWell, to start, it stands for Digital Forensics and Incident Response. This field covers the collection of forensic artifacts from digital5 min read·Oct 7, 2023----
a1l4mBefore Forensicstechnically I know that is not forensics, but I believe it’s essential to know this stuff before starting :”4 min read·Oct 7, 2023----
a1l4mCyberTalents BlueTeam Scholarship CTF WriteupsI had the privilege of participating in an individual Capture The Flag (CTF) event hosted by Cybertalents, wherein I achieved first place…6 min read·Sep 30, 2023--1--1
a1l4mUsing Facebook as a C2 ServerImagine seeing your machine connecting to the Facebook domain. It seems legit, right? Well, maybe most of the time, but not today.4 min read·Sep 26, 2023----
a1l4mCyberDefenders — FalconEye WriteupDCsync | Network | Security | Pass The Hash | SIEM | Splunk6 min read·Sep 3, 2023--1--1