The Mastermind Notes
  • Home
  • About
Sign in Subscribe
COMPTIA Pentest+ Study Notes | Cyber Security Notes

COMPTIA Pentest+ Study Notes | Cyber Security Notes

COMPTIA PenTest+ is CompTIA’s intermediate-level offensive security cert. It’s meant for professionals who want to demonstrate their…
Read More
Packet & Log Analysis with Zeek | TryHackMe Zeek P1 & P2 & P3

Packet & Log Analysis with Zeek | TryHackMe Zeek P1 & P2 & P3

We covered an introduction to Zeek, packets and logs analyzer, that can be used for network security monitoring, incident analysis and logs…
Read More
Process Injection & Hollowing Explained | TryHackMe Abusing Windows Internals P1

Process Injection & Hollowing Explained | TryHackMe Abusing Windows Internals P1

We covered process injection and process hollowing. Process injection is the process of injecting an already running process with malicious…
Read More
Microsoft Office Word Document Malware Analysis | HackTheBox Diagnostic

Microsoft Office Word Document Malware Analysis | HackTheBox Diagnostic

We covered analyzing a sample Microsoft office word document using oletools to extract relevant Macros and links. The sample document…
Read More
Cyber Threat Intelligence Platforms | OpenCTI | TryHackMe

Cyber Threat Intelligence Platforms | OpenCTI | TryHackMe

We briefly talked about cyber threat intelligence, tools and platforms used and how threat data is ingested into these tools. We covered…
Read More
Understainding Windows OS Processes and Internals | TryHackMe Internals

Understainding Windows OS Processes and Internals | TryHackMe Internals

We covered basics of Windows internals including processes, virtual memory allocation, handles, DLLs, Portable executable header and other…
Read More
Command Injection Explained | OWASP TOP 10 | HackTheBox LoveTok

Command Injection Explained | OWASP TOP 10 | HackTheBox LoveTok

We briefly explained command injection as one of the top 10 web application vulnerabilities. Command injection allows an attacker to…
Read More
Cleaning a Linux Infected Machine | HackTheBox PersistenceFutile

Cleaning a Linux Infected Machine | HackTheBox PersistenceFutile

We covered an incident response scenario from HackTheBox named PersistenceFutile where we went over an infected Linux machine and we were…
Read More
Windows Forensics P2 | The File System | TryHackMe Cyber Defense

Windows Forensics P2 | The File System | TryHackMe Cyber Defense

We covered the second part of Windows OS forensics where we demonstrated gathering artifacts from the file system. We covered extracting…
Read More
Windows Forensics Part 1 | Registry Forensics | TryHackMe

Windows Forensics Part 1 | Registry Forensics | TryHackMe

We covered the process of conducting computer forensics under the context of examining a Windows operating system. We explained what are…
Read More
Local File Inclusion & Log Poisoning Explained | HackTheBox Toxic

Local File Inclusion & Log Poisoning Explained | HackTheBox Toxic

We covered local file inclusion that is a web application vulenrability. We also covered the concept of log file posioning and how we can…
Read More
Post-Exploitation Explained | TryHackMe Enumeration | Red Team Track

Post-Exploitation Explained | TryHackMe Enumeration | Red Team Track

We covered enumerating Windows and Linux during the post-exploitation phase of a penetration test. Enumeration post-exploitation can have…
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost