The Mastermind Notes
  • Home
  • About
Sign in Subscribe
Android Forensics | Mobile Forensics | HackTheBox Cat

Android Forensics | Mobile Forensics | HackTheBox Cat

We covered the subject of Mobile forensics and briefly went over the scenario of data extraction from an Android backup. Android backups…
Read More
Network Security Protocols Explained | TryHackMe Security Engineer Track

Network Security Protocols Explained | TryHackMe Security Engineer Track

We covered network security protocols on the application layer, presentation layer and network layer of the OSI model. These protocols are…
Read More
Windows Privilege Escalation | Efs Potato | TryHackMe Stealth

Windows Privilege Escalation | Efs Potato | TryHackMe Stealth

We covered TryHackMe Stealth machine where we went over the typical stages of enumerating open ports and services with Nmap and we found an…
Read More
Analyzing Malicious Microsoft Office Word Document | HackTheBox Emo

Analyzing Malicious Microsoft Office Word Document | HackTheBox Emo

We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The document was claimed to cause…
Read More
The Complete Guide to Phishing Attacks | TryHackMe

The Complete Guide to Phishing Attacks | TryHackMe

We covered phishing attacks, how they work, components of a phishing email, components of phishing infrastructure, phishing assessment…
Read More
Yara Rules Explained | Complete Tutorial | TryHackMe Yara

Yara Rules Explained | Complete Tutorial | TryHackMe Yara

We covered an introduction to YARA rules and how to create them to detect malwares using patterns that match common indicators of…
Read More
PASTA Framework Explained | Threat Modeling | TryHackMe

PASTA Framework Explained | Threat Modeling | TryHackMe

We covered the PASTA (Process for Attack Simulation and Threat Analysis) framework for risk assessment and threat modeling. We explained…
Read More
Nebula Exploit walkthrough level 04 | Code Analysis in C Language

Nebula Exploit walkthrough level 04 | Code Analysis in C Language

Nebula Level 04 Description
Read More
Decoding Radio SSTV and Audio Signals | Hardware Hacking P4 | HackTheBox Signals

Decoding Radio SSTV and Audio Signals | Hardware Hacking P4 | HackTheBox Signals

We covered the fourth part of hardware hacking series where we used HackTheBox Signals for demonstration purposes. We had an audio file…
Read More
Hardware Hacking P2 | Logic Analyzers | HackTheBox Debugging Interface

Hardware Hacking P2 | Logic Analyzers | HackTheBox Debugging Interface

We covered another hardware hacking challenge where we demonstrated an analysis of an archived file that was created by capturing data off…
Read More
Buffer Overflow Exploitation with Radare2 | P21 | HackTheBox Reg

Buffer Overflow Exploitation with Radare2 | P21 | HackTheBox Reg

We covered another example of a vulnerable binary to buffer overflow vulnerability. The binary has NX enabled to prevent code execution in…
Read More

Information Security Management Concepts Explained | TryHackMe

We covered information security management concepts such as information security governance, information security regulations, risk…
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost