The Mastermind Notes
  • Home
  • About
Sign in Subscribe
Practical Purple Team | TryHackMe Atomic Bird Goes Purple #1

Practical Purple Team | TryHackMe Atomic Bird Goes Purple #1

We covered practical purple teaming by conducting threat emulation using Atomic red team and examining the impact of said emulation by…
Read More
NoSQL Injection For Beginners | TryHackMe NoSQL Injection

NoSQL Injection For Beginners | TryHackMe NoSQL Injection

We covered an introduction to NoSQL, the difference between NoSQL & SQL and NoSQL operators. We discussed the two basic types of NoSQL…
Read More
Linux Ransomware Analysis with Ghidra & Any.Run

Linux Ransomware Analysis with Ghidra & Any.Run

We analyzed a sample Linux ransomware using reverse engineering tools such as Ghidra and Radare2. Additionally, we performed dynamic…
Read More
Complete Guide to Threat Emulation Using Caldera | TryHackMe CALDERA

Complete Guide to Threat Emulation Using Caldera | TryHackMe CALDERA

We covered threat emulation using Caldera which is a popular tool that can be used to emulate adversary and attacker’s behavious as well as…
Read More
Microsoft Windows Hardening P1 | Windows Security | TryHackMe

Microsoft Windows Hardening P1 | Windows Security | TryHackMe

We covered how to harden and secure Windows workstations from both the identity management and network side.This was part of TryHackme…
Read More
XOR Cryptography with Python | TryHackMe W1seGuy

XOR Cryptography with Python | TryHackMe W1seGuy

We solved a cryptography CTF challenge where XOR encryption and HEX encoding were used to encrypt and encode the challenge flag. We used…
Read More
Security Assessment With Atomic Red Team Tutorial | TryHackMe Atomic Red Team

Security Assessment With Atomic Red Team Tutorial | TryHackMe Atomic Red Team

We covered conducting security testing and assessment using Atomic Red Team framework. Atomic Red Team is a library of techniques mapped…
Read More
Threat Emulation Explained | Understanding Hacker’s Mentality | TryHackMe Intro to Threat Emulation

Threat Emulation Explained | Understanding Hacker’s Mentality | TryHackMe Intro to Threat Emulation

We covered the concept of threat emulation, the difference between threat emulation, threat simulation and penetration testing in addition…
Read More
DNS Tunneling Explained | TryHackMe DNS Data Exfiltration

DNS Tunneling Explained | TryHackMe DNS Data Exfiltration

We covered DNS tunneling technique along with SSH Dynamic port forwarding that are used to perform DNS data exfiltration. This was part of…
Read More
Ransomware Detection Using SIEM | Elastic Search | TryHackMe Hunt Me II: Typo Squatters

Ransomware Detection Using SIEM | Elastic Search | TryHackMe Hunt Me II: Typo Squatters

We covered a scenario of Windows machine compromised with a fake 7z archiving tools designed to infect machines with Windows installer…
Read More
Threat Hunting Case Study | The Strange Invoice | TryHackMe Hunt Me 1: Payment Collectors

Threat Hunting Case Study | The Strange Invoice | TryHackMe Hunt Me 1: Payment Collectors

We covered a threat hunting challenge that involved hunting Windows event logs exported from a compromised machine due to recent phishing…
Read More
Microsoft Cybersecurity Analyst Professional Certificate Review SC-900

Microsoft Cybersecurity Analyst Professional Certificate Review SC-900

The Microsoft Cybersecurity analyst from coursera covers the below courses:
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost