HackTheBox Greenhorn Writeup
Introduction to HackTheBox Greenhorn HackTheBox Greenhorn is categorized as an easy HackTheBox machine, but achieving root access…
Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.
Introduction to HackTheBox Greenhorn HackTheBox Greenhorn is categorized as an easy HackTheBox machine, but achieving root access…
Overview The “Vanhelsing” ransomware intriguingly borrows its name from a popular vampire-themed TV series, indicating how modern…
Introduction to HackTheBox alphascii clashing Designed for beginners, HackTheBox Alphascii Clashing is a very-easy-level challenge that offers…
Introduction If you’re just getting into cybersecurity and want a certification that proves your hands-on skills, two…
Queen of the South is a crime drama based on the novel La Reina del Sur by…
Introduction to Lumma Malware Lumma is a powerful information stealer malware designed to extract sensitive data from…
Introduction to HackTheBox Armaxis The “Armaxis” challenge from the HackTheBox University CTF 2024 involves exploiting vulnerabilities in…
Insidious (2010) Chapter 1 Recap & Review Josh and Renai Lambert (Patrick Wilson and Rose Byrne) move…
This article explores cybersecurity flaws in dating apps, specifically injection attacks and cross-site scripting (XSS) exploits. The…
This article provides an in-depth analysis of the Risen ransomware, a malicious software designed to encrypt user…
Introduction to HackTheBox APT In this article, we covered various aspects of Active Directory Penetration Testing using…
This article covers enumerating and exploiting FTP in the TryHackMe Network Services room, part of the CompTIA…
In this article, we covered threat intelligence concepts and how to use the threat intelligence platform AlientVault…
HTTP Header (X-Forwarded-For) 🔹 What is the X-Forwarded-For Header? 🔹 The Exploit 🔹 Steps to Exploit Prevention…
This article explores how VOIP web applications, specifically MagnusBilling, can be exploited using simple command-line techniques. This…
Introduction This article presents detailed practical steps for ethical hacking penetration testing. The goal is to guide…
Plot Summary ​Zero Day is a six-part political thriller series that premiered on Netflix on February 20,…
The article is an in-depth forensics guide on how to analyze the NTFS (New Technology File System)…
This article discusses data exfiltration techniques using the HTTP protocol, explaining why HTTP is one of the…
This article is a deep dive into Telnet, covering enumeration, exploitation, penetration testing and security concerns related…