All Publications

DNS & ICMP Traffic Characteristics Normal vs Suspicious Behavior

44% of ransomware attacks in the first half of 2024 were spotted by monitoring for lateral movement indicators like port scanning. Effective…

networking

Process Hollowing

A short mind map of methods and APIs used by a process hollowing technique.

infosec

Cyber Kill Chain

Cyber Kill Chain = phases of attack. Incdent Response process is absctracted into incident cycle and cyber kill chain, where incidnet cycle…

infosec

File Upload Attacks

A mind map of what I've learnt while going through HTB Academy File Upload Attacks module.

infosec

Command Injections

A mind map of what I've learnt while going through HTB Academy Command Injections module.

infosec

How I Passed the CISSP

At the time all I knew about it is the name itself and that it is one of the top recognized certifications in the industry. I was told that…

infosec

Access control vulnerabilities and privilege escalation @WebSecAcademy Lab Notes

This is just a draft, and it will be refined over time. What is access control? access control = authorization In the context of web…

infosec

Information Disclosure @WebSecAcademy Lab Notes

Theory is available at: https://portswigger.net/web-security/information-disclosure This learning section at the moment of writing the…

infosec

Hello, World!

Check out one of my first javascript projects: base64 decoder

JavaScript

©2026 infosam.space, built by Sam with