The Mastermind Notes
  • Home
  • About
Sign in Subscribe
Server Side Includes Injection Explained | EP1 | H.A.S.T.E Vulnhub Walkthrough CTF

Server Side Includes Injection Explained | EP1 | H.A.S.T.E Vulnhub Walkthrough CTF

We covered the solution to H.A.S.T.E Vulnhub machine and we demonstrated Server Side Includes Injection that led to gaining access to the…
Read More
Docker Container Penetration Testing | Docker VulnHub CTF Walkthrough

Docker Container Penetration Testing | Docker VulnHub CTF Walkthrough

We covered the solution of Docker VulnHub lab where we performed a penetration testing for a Docker container running a WordPress website.
Read More
PhpMyAdmin Command Injection | EP1 | Zico2 VulnHub CTF Walkthrough

PhpMyAdmin Command Injection | EP1 | Zico2 VulnHub CTF Walkthrough

We covered the first part of Zico2 VulnHub CTF Walkthrough where we demonstrated command injection in an old version of PhpMyAdmin database…
Read More
From Web Into SSH Shell | Covfefe VulnHub CTF WalkThrough

From Web Into SSH Shell | Covfefe VulnHub CTF WalkThrough

We demonstrated a simple boot2root CTF walkthrough named, Covfefe, where we performed an initial Nmap scan followed by directory discovery…
Read More

OWASP Hackaedmic CTF Walkthrough

OWASP Hackademic collection of Web Application Penetration Testing challenges is very good start if you are getting started in web hacking…
Read More
OSINT Case Studies P2 | Blockchain & Manhunt | HackTheBox Block Hunt3r & Missing in action

OSINT Case Studies P2 | Blockchain & Manhunt | HackTheBox Block Hunt3r & Missing in action

We covered the second part of open source intelligence case studies as part of HackTheBox OSINT track. The first challenge, block hunt3r…
Read More
Web Application Vulnerability Scanning with OWASP ZAP | TryHackMe

Web Application Vulnerability Scanning with OWASP ZAP | TryHackMe

In this video walk-through, we covered OWASP ZAP web application vulnerability scanner to perform vulnerability scanning on a lab…
Read More
Open Source Intelligence Case Studies | HackTheBox Easy Phish, Infiltration & ID Exposed.

Open Source Intelligence Case Studies | HackTheBox Easy Phish, Infiltration & ID Exposed.

We covered multiple OSINT case studies and challenges from HackTheBox, namely Easy Phish, Infiltration & ID Exposed, where we demonstrated…
Read More
MITRE ATT&CK Framework APT28 | Cyber Security Case Study | TryHackMe Eviction

MITRE ATT&CK Framework APT28 | Cyber Security Case Study | TryHackMe Eviction

We covered a practical case study where we discussed the tactics, techniques and procedures used by advanced persistent group APT28. As a…
Read More
Clearing Tracks in Windows | TryHackMe Evading Logging & Monitoring

Clearing Tracks in Windows | TryHackMe Evading Logging & Monitoring

We covered techniques and methods in clearing tracks and evading Windows event logging. First we explained the components of Event Tracing…
Read More
Bypassing Anti-Malware Scanning Interface (AMSI) Explained | TryHackMe Runtime Detection Evasion

Bypassing Anti-Malware Scanning Interface (AMSI) Explained | TryHackMe Runtime Detection Evasion

We covered the concept of runtime detection using Anti-Malware Scanning Interface (AMSI). We also covered common bypass methods such as…
Read More

Meterpreter commands in Kali Linux | TryHackMe Metasploit: Meterpreter

Introduction
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost