The Mastermind Notes
  • Home
  • About
Sign in Subscribe
The Pyramid of pain Explained | Threat Hunting | TryHackMe

The Pyramid of pain Explained | Threat Hunting | TryHackMe

We covered The Pyramid of pain concept used in incident response and threat hunting which covers the artifacts of the attacker’s tools and…
Read More
Exploiting Pluck CMS and Linux Privilege Escalation | TryHackMe Dreaming

Exploiting Pluck CMS and Linux Privilege Escalation | TryHackMe Dreaming

We covered TryHackMe Dreaming challenge where we demonstrated penetration testing concepts such as exploiting a vulnerable version of Pluck…
Read More
Investigating a Hacked Webserver with Ecnrypted PHP Webshell | HackTheBox Obscure

Investigating a Hacked Webserver with Ecnrypted PHP Webshell | HackTheBox Obscure

We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by exploiting a file upload…
Read More
Port Scanning and Information Gathering With Nmap and Nikto | TryHackMe Probe

Port Scanning and Information Gathering With Nmap and Nikto | TryHackMe Probe

We covered scanning hosts for services, open ports, running software, hidden directories using scanning tools such as Nmap and Nikto. We…
Read More
Bypassing File Upload Filters P5 | Upload Vulnerabilities TryHackMe

Bypassing File Upload Filters P5 | Upload Vulnerabilities TryHackMe

We covered TryHackMe Upload Vulnerabilities room where we demonstrated methods and techniques to exploit file upload vulnerabilities in…
Read More
Encyption and Cryptography 101 | TryHackMe Encryption — Crypto 101

Encyption and Cryptography 101 | TryHackMe Encryption — Crypto 101

We covered basics of Encryption and Cryptography by answering the questions in TryHackMe Encryption — Crypto 101 under complete beginner…
Read More
Incident Analysis with ELK Kibana | HTTP Logs Analysis | TryHackMe ItsyBitsy

Incident Analysis with ELK Kibana | HTTP Logs Analysis | TryHackMe ItsyBitsy

We covered cyber incident analysis with ELK Kibana or Elastic Search. We covered http logs pulled from a compromised Windows machine…
Read More
Redis NoSQL Database Exploit Using SSH | HackTheBox Postman

Redis NoSQL Database Exploit Using SSH | HackTheBox Postman

We covered the enumeration of Redis NoSQL database server and exploitation using SSH. This was part of HackTheBox Postman
Read More

Introduction to Digital Forensics and Incident Response | TryHackMe DFIR

We covered basic and essential concepts and tools in Digital Forensics and Incident Response. This was part of TryHackMe DFIR.
Read More

Command Injection Practical Scenario | TryHackMe Epoch

We covered a practical scenario on command injection using TryHackMe Epoch room.
Read More
Investigating an Infected Windows Active Directory | TryHackMe Recovering Active Directory

Investigating an Infected Windows Active Directory | TryHackMe Recovering Active Directory

We covered the process of incident response and the steps taken to investigate and recover an infected Windows active directory system. We…
Read More
Session ID Hijacking With Burp Suite | OverTheWire Natas Level 20

Session ID Hijacking With Burp Suite | OverTheWire Natas Level 20

We covered OverTheWire Natas 19–20 level. In this level, the web application used an if statement to verify if the user input contained…
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost