The Mastermind Notes
  • Home
  • About
  • Cybersecurity Learning System
  • Cybersecurity Coaching
Sign in Subscribe
Android Reverse Engineering | Part 2 | Extracting Encrypted Secrets

Android Reverse Engineering | Part 2 | Extracting Encrypted Secrets

We covered the second part of Android APK reverse engineering where we used Ghidra and Jadx-GUI to decompile an android APK sample to…
Read More
Windows Active Directory Privilege Escalation with Juicy Potato | Cyberseclabs Potato Walkthrough

Windows Active Directory Privilege Escalation with Juicy Potato | Cyberseclabs Potato Walkthrough

In this post, we covered the solution of Cyberseclabs potato where we demonstrated the exploitation of a vulnerable Jenkins server and the…
Read More
Android Reverse Engineering Basics | Part 1 | React Native Applications

Android Reverse Engineering Basics | Part 1 | React Native Applications

We covered the first part of Android applications reverse engineering basics where we discussed file format of Android applications, the…
Read More
Windows Active Directory Penetration Testing Study Notes
Cybersecurity Notes

Windows Active Directory Penetration Testing Study Notes

AD Pentesting Notes
Read More
Threat Hunting Challenge with Elastic Search | TryHackMe Threat Hunting EndGame

Threat Hunting Challenge with Elastic Search | TryHackMe Threat Hunting EndGame

We covered a threat hunting challenge using elastic search where we demonstrated searching and analyzing logs to detect signs of…
Read More
Exploiting Hidden Ports Using Python & Directory Traversal | TryHackMe Airplane CTF

Exploiting Hidden Ports Using Python & Directory Traversal | TryHackMe Airplane CTF

We covered a CTF scenario where we started with nmap scanning followed by enumeration of the web application running on port 8000 where we…
Read More
Microsoft Cyber Security Analyst SC-900 Study Notes
Cybersecurity Notes

Microsoft Cyber Security Analyst SC-900 Study Notes

The SC-900 Study Notes and structured Microsoft Cyber Security Analyst Study guide provide a practical, exam-focused pathway for mastering the fundamentals required for the Microsoft SC-900 certification.
Read More
Linux Log Analysis Case Study | Detecting SSH Brute Force Attacks

Linux Log Analysis Case Study | Detecting SSH Brute Force Attacks

We covered Linux authentication logs, log files locations in Linux, Linux log analysis tools available in Linux and took a case study where…
Read More
Buffer Overflow Exploitation with Immunity Debugger | TryHackMe Buffer Overflow

Buffer Overflow Exploitation with Immunity Debugger | TryHackMe Buffer Overflow

We covered the first part of buffer overflow training using TryHackMe Buffer Overflow room which is part of the OSCP pathway. In this part…
Read More
Network Forensics with Powershell | TryHackMe Windows Network Analysis

Network Forensics with Powershell | TryHackMe Windows Network Analysis

We covered network analysis and forensics on Windows using Powershell and CMD. We analyzed an infected machine making network connections…
Read More
Live Linux Forensics | Processes & Cronjobs | TryHackMe Linux Process Analysis

Live Linux Forensics | Processes & Cronjobs | TryHackMe Linux Process Analysis

Introduction
Read More
The Elastic Stack Study Notes
Cybersecurity Notes

The Elastic Stack Study Notes

The Elastic Stack Study guide explains how Elasticsearch functions as the core storage and search engine, while Logstash and Beats handle data ingestion pipelines.
Read More
The Mastermind Notes © 2026
  • Sign up
Powered by Ghost