The Mastermind Notes
  • Home
  • About
Sign in Subscribe
Computer Forensics Tools | Kroll Artifact Parser and Extractor | TryHackMe KAPE

Computer Forensics Tools | Kroll Artifact Parser and Extractor | TryHackMe KAPE

We covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics investigation. We also provided…
Read More

How To Become a Junior Security Analyst | TryHackMe Jr Security Analyst Intro

We covered the role of Junior security operations center analyst, the responsibilities and the required skills and certifications. We also…
Read More
How to Become a Professional Blogger & YouTuber

How to Become a Professional Blogger & YouTuber

Alternate title: Creative steps to becoming a pro blogger
Read More
Incident Response in Cyber Security | Training Course

Incident Response in Cyber Security | Training Course

In this video, we covered the incident response lifecycle with all its stages covered and explained. Incident response phases start with…
Read More
Free OSINT Mini Course | Learn OSINT in Under Two Hours

Free OSINT Mini Course | Learn OSINT in Under Two Hours

In this OSINT mini course, I tried to cover the basic subjects of open source intelligence. This mini course is a curated and tailored…
Read More
Pyramid of Pain in Cybersecurity Explained Practically | TryHackMe Summit

Pyramid of Pain in Cybersecurity Explained Practically | TryHackMe Summit

We covered a newly-released challenge, named Summit, into the SOC level 1 track in TryHackMe. The challenge wraps blue teamers and red…
Read More
Wireless Vulnerabilities in Practice | WPS Pixie-Dust Attack Explained

Wireless Vulnerabilities in Practice | WPS Pixie-Dust Attack Explained

We covered one of the most popular wireless vulnerabilities, that is, WPS feature. Most wireless attacks that target this feature focus on…
Read More
Incident Response in Cyber Security | Identification & Scoping Phase | TryHackMe

Incident Response in Cyber Security | Identification & Scoping Phase | TryHackMe

We covered the second phase of incident response, that is, identification & scoping or detection phase. In the detection phase, the SOC…
Read More
Linux Privilege Escalation | GoldenEye Vulnhub CTF walkthrough | OSCP Machine

Linux Privilege Escalation | GoldenEye Vulnhub CTF walkthrough | OSCP Machine

We demonstrated the solution walkthrough of GoldenEye Vulnhub machine in which we covered many penentration testing concepts and used…
Read More
Web Hacking & Pentesting Study Notes

Web Hacking & Pentesting Study Notes

Who Are These Notes For?
Read More
How can stored XSS vulnerability lead to cookie stealing?

How can stored XSS vulnerability lead to cookie stealing?

We covered brief introduction to both types of cross site scripting vulnerability (XSS), reflected & stored xss, and demonstrated a…
Read More
Cyber Security Incident Response Explained | Preparation Phase | TryHackMe Preparation

Cyber Security Incident Response Explained | Preparation Phase | TryHackMe Preparation

We covered an introduction to incident response in cyber security including the phases starting with prepraration, identification then…
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost