The Mastermind Notes
  • Home
  • About
Sign in Subscribe
Android Reverse Engineering | Part 2 | Extracting Encrypted Secrets

Android Reverse Engineering | Part 2 | Extracting Encrypted Secrets

We covered the second part of Android APK reverse engineering where we used Ghidra and Jadx-GUI to decompile an android APK sample to…
Read More
Windows Active Directory Privilege Escalation with Juicy Potato | Cyberseclabs Potato Walkthrough

Windows Active Directory Privilege Escalation with Juicy Potato | Cyberseclabs Potato Walkthrough

In this post, we covered the solution of Cyberseclabs potato where we demonstrated the exploitation of a vulnerable Jenkins server and the…
Read More
Android Reverse Engineering Basics | Part 1 | React Native Applications

Android Reverse Engineering Basics | Part 1 | React Native Applications

We covered the first part of Android applications reverse engineering basics where we discussed file format of Android applications, the…
Read More
Windows Active Directory Penetration Testing Study Notes

Windows Active Directory Penetration Testing Study Notes

Table of Contents
Read More
Threat Hunting Challenge with Elastic Search | TryHackMe Threat Hunting EndGame

Threat Hunting Challenge with Elastic Search | TryHackMe Threat Hunting EndGame

We covered a threat hunting challenge using elastic search where we demonstrated searching and analyzing logs to detect signs of…
Read More
Exploiting Hidden Ports Using Python & Directory Traversal | TryHackMe Airplane CTF

Exploiting Hidden Ports Using Python & Directory Traversal | TryHackMe Airplane CTF

We covered a CTF scenario where we started with nmap scanning followed by enumeration of the web application running on port 8000 where we…
Read More
Microsoft Cyber Security Analyst SC-900 Study Notes

Microsoft Cyber Security Analyst SC-900 Study Notes

Microsoft Cyber Security Analyst SC-900 Exam Details
Read More
Linux Log Analysis Case Study | Detecting SSH Brute Force Attacks

Linux Log Analysis Case Study | Detecting SSH Brute Force Attacks

We covered Linux authentication logs, log files locations in Linux, Linux log analysis tools available in Linux and took a case study where…
Read More
Buffer Overflow Exploitation with Immunity Debugger | TryHackMe Buffer Overflow

Buffer Overflow Exploitation with Immunity Debugger | TryHackMe Buffer Overflow

We covered the first part of buffer overflow training using TryHackMe Buffer Overflow room which is part of the OSCP pathway. In this part…
Read More
Network Forensics with Powershell | TryHackMe Windows Network Analysis

Network Forensics with Powershell | TryHackMe Windows Network Analysis

We covered network analysis and forensics on Windows using Powershell and CMD. We analyzed an infected machine making network connections…
Read More
Live Linux Forensics | Processes & Cronjobs | TryHackMe Linux Process Analysis

Live Linux Forensics | Processes & Cronjobs | TryHackMe Linux Process Analysis

Introduction
Read More
The Elastic Stack Study Notes

The Elastic Stack Study Notes

What is Elastic Stack?
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost