The Mastermind Notes
  • Home
  • About
Sign in Subscribe
Penetration Testing For Beginners | Basic pentesting 1 Vulnhub Walkthrough CTF

Penetration Testing For Beginners | Basic pentesting 1 Vulnhub Walkthrough CTF

We covered the solution walkthrough of Basic pentesting 1 Vulnhub by introducing the basic steps and methodology involved in a penetration…
Read More
How to Perform Windows Active Directory Penetration Testing | Cybeseclabs Secret

How to Perform Windows Active Directory Penetration Testing | Cybeseclabs Secret

We demonstrated the steps taken to perform penetration testing for Windows machine with Active Directory installed. We escalated our…
Read More
Firmware Vulnerability Scanning & Security Testing with BugProve

Firmware Vulnerability Scanning & Security Testing with BugProve

We covered analyzing firmware images and scanning it for vulnerabilities and security misconfigurations using BugProve as an effective…
Read More
Port Knocking & Wireshark Packet Analysis | Moria Vulnhub CTF Walkthrough Solution

Port Knocking & Wireshark Packet Analysis | Moria Vulnhub CTF Walkthrough Solution

We covered the solution walkthrough of Moria Vulnhub by analyzing Wireshark Pcap file to extract a series of ports which are used to…
Read More
Firewall Evasion Techniques | Full Tutorial

Firewall Evasion Techniques | Full Tutorial

We covered firewall evasion tactics that are needed when conducting a red team engagement. Firewall Evasion tactics encompass using nmap…
Read More

Port Knocking & Binary Exploitation | Cyberry Vulnhub CTF Walkthrough

We covered the first part solution walkthrough of Cyberry Vulnhub lab where we demonstrated port knocking.
Read More
Log File Poisoning | G0rmint Vulnhub CTF Walkthrough

Log File Poisoning | G0rmint Vulnhub CTF Walkthrough

We covered the solution of G0rmint Vulnhub lab by applying log file poisoning in a website based on PHP to execute system command.
Read More
Directory Traversal with Dirbuster | D0not5top Vulnhub CTF Walkthrough

Directory Traversal with Dirbuster | D0not5top Vulnhub CTF Walkthrough

We covered the first part solution to D0not5top Vulnhub lab by using a combinations of active information gathering techniques along with…
Read More

Metasploitable 1 | Complete Walkthrough Tutorial

We covered the first part of Metasploitable 1 lab where we demonstrated Twiki exploitation and Linux privielge escalation through kernel…
Read More
Web Application Exploitation | EP1 | C0m80 Vulnhub CTF challenge

Web Application Exploitation | EP1 | C0m80 Vulnhub CTF challenge

We covered the solution for C0m80 Vulnhub where we demonstrated the exploitation of Mantis bug tracker web application and at the end…
Read More

Game of Thrones CTF Walkthrough Vulnhub

We covered the first part solution of Game of Thrones CTF Vulnhub where we gathered the challenge flags using various active information…
Read More
WordPress Penetration Testing | EP1 | LazySysAdmin VulnHub Walkthrough CTF

WordPress Penetration Testing | EP1 | LazySysAdmin VulnHub Walkthrough CTF

We covered the solution of LazySysAdmin VulnHub machine where we covered WordPress Penetration Testing & exploiting SMB shares.
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost