The Mastermind Notes
  • Home
  • About
Sign in Subscribe
Threat Hunting with Elastic Search | TryHackMe Threat Hunting: Pivoting

Threat Hunting with Elastic Search | TryHackMe Threat Hunting: Pivoting

We covered part two of threat hunting with elastic search. We covered queries and methodologies to uncover threats and attacker’s…
Read More
Loki Locker Ransomware Detection | Windows Events Logs Analysis

Loki Locker Ransomware Detection | Windows Events Logs Analysis

We covered analyzing Windows events logs using Python-evtx and chainsaw. We started with extracting Powershell logs and from there we…
Read More
Open Source Intelligence (OSINT) Study Notes in PDF

Open Source Intelligence (OSINT) Study Notes in PDF

What is Open Source Intelligence?
Read More
Linux Privilege Escalation | TryHackMe common priv esc

Linux Privilege Escalation | TryHackMe common priv esc

We covered threat hunting in-depth, compared threat hunting with incident response, we covered common Linux Privilege Escalation…
Read More
Threat Hunting Techniques in Cyber Security | TryHackMe Threat Hunting: Foothold

Threat Hunting Techniques in Cyber Security | TryHackMe Threat Hunting: Foothold

We covered threat hunting in-depth, compared threat hunting with incident response, covered a MITRE-based approach to hunt for threats…
Read More
Windows Privilege Escalation with Metasploit | TryHackMe CyberLens CTF

Windows Privilege Escalation with Metasploit | TryHackMe CyberLens CTF

We covered a very easy penetration testing challenge where we started with an Nmap scan followed by web enumeration then we found out a…
Read More
SOAR in Cyber Security Explained | TryHackMe SOAR

SOAR in Cyber Security Explained | TryHackMe SOAR

What is SOAR
Read More
Investigating Cyber Attacks With Snort | TryHackMe Snort Challenge

Investigating Cyber Attacks With Snort | TryHackMe Snort Challenge

We covered using Snort to investigate and stop cyber attacks. This was part of the online lab room TryHackMe Snort Challenge — Live…
Read More
Basics of Network Traffic Analysis | TryHackMe Traffic Analysis Essentials

Basics of Network Traffic Analysis | TryHackMe Traffic Analysis Essentials

We covered network traffic analysis essentials for the purpose of incident response and network troubleshooting. This was part of solving…
Read More
Aurora EDR for Cybersecurity & Incident Response | TryHackMe Aurora EDR

Aurora EDR for Cybersecurity & Incident Response | TryHackMe Aurora EDR

In this post , we covered Aurora endpoint and detection response agent tool that is used in detecting and responding to cyber security…
Read More
Demonstrating Black Box Penetration Testing | TryHackMe Relevant

Demonstrating Black Box Penetration Testing | TryHackMe Relevant

In this post, we covered a black box penetration testing challenge where we performed initial port scanning, found network shares from…
Read More
TryHackMe OWASP Juice Shop | The Complete Guide

TryHackMe OWASP Juice Shop | The Complete Guide

We covered broken authentication and SQL injection walkthrough as part of OWASP Juice Shop from TryHackMe. we will look at OWASP’s TOP 10…
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost