The Mastermind Notes
  • Home
  • About
Sign in Subscribe
Using SOC & Threat Intelligence in Cybersecurity | TryHackMe Threat Intelligence for SOC

Using SOC & Threat Intelligence in Cybersecurity | TryHackMe Threat Intelligence for SOC

In this post , we covered the concept of threat intelligence, how it’s performed and what are the IOCs collected during threat…
Read More
Understanding Tactical Detection and Detection Engineering | TryHackMe Intro to Detection…

Understanding Tactical Detection and Detection Engineering | TryHackMe Intro to Detection…

In this post , we covered an introduction to tactical detection where we used sigma rules to build unified detection rules used across…
Read More
Craft CMS CVE-2023–41892 Vulnerability Exploitation | POC

Craft CMS CVE-2023–41892 Vulnerability Exploitation | POC

We covered the CVE-2023–41892 proof of concept that affected Craft CMS manually and with Metasploit framework. CVE-2023–41892 is a security…
Read More
Investigating a Hacked PhpMyAdmin Database With The Elastic Stack | TryHackMe Slingshot

Investigating a Hacked PhpMyAdmin Database With The Elastic Stack | TryHackMe Slingshot

We covered investigating a cyber incident scenario ,where PhpMyAdmin database was hacked along with its e-commerce website, using the…
Read More
Nmap Complete Practical Tutorial | TryHackMe Nmap

Nmap Complete Practical Tutorial | TryHackMe Nmap

Introduction to Nmap and Portscanning
Read More
Ransomware Detection with Advanced Elastic Search Queries | TryHackMe Advanced ELK

Ransomware Detection with Advanced Elastic Search Queries | TryHackMe Advanced ELK

We covered using advanced queries in Kibana and Elastic Search such as using nested queries, queries to extract number and date ranges…
Read More
Active Directory Penetration Testing | TryHackMe Breaching Active Directory

Active Directory Penetration Testing | TryHackMe Breaching Active Directory

In this post, we will cover the answers of TryHackMe Breaching Active Directory room in addition to demonstrating the concepts of Active…
Read More
Insomni’Hack CTF Finals 2024 | Notes

Insomni’Hack CTF Finals 2024 | Notes

CTF Challenge Description:
Read More
Insomni’hack 2024 CTF | The Quest

Insomni’hack 2024 CTF | The Quest

The map specified in the challenge statement is as follows. It signifies the location in which the CTF is conducted. Each of the three red…
Read More
Blocking Facebook and Bittorrent With PaloAlto Networks Firewall

Blocking Facebook and Bittorrent With PaloAlto Networks Firewall

We covered blocking Facebook, Twitter and BitTorrent using Paloalto networks firewall by creating an application filter and specifying the…
Read More
Pickle Rick CTF TryHackMe | The Absolute Beginner Pentesting

Pickle Rick CTF TryHackMe | The Absolute Beginner Pentesting

We performed an Nmap scanning to enumerate open ports and we discovered an HTTP service which after enough enumeration we were able to…
Read More
Hard Disk Image Forensics and Analysis with Autopsy | TryHackMe | Computer Forensics

Hard Disk Image Forensics and Analysis with Autopsy | TryHackMe | Computer Forensics

We covered Disk analysis and forensics using Autopsy. We extracted forensic artifacts about the operating system and uses. This was part of…
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost