Skip to content
  • July 27, 2025
The masterminds notes / motasem hamdan logo The MasterMinds Notes | Motasem Hamdan
The masterminds notes / motasem hamdan logo The MasterMinds Notes | Motasem Hamdan
  • Home
  • Study Notes
    • The Full Cybersecurity Notes Catalogue
    • Certification Notes
      • Red Team
        • OSCP
        • OSWP
        • OSWA
        • OSEP
        • COMPTIA Pentest+
        • CRTP Study Notes
        • HackTheBox CPTS
        • Certified Red Team Professional (CRTP)
        • HackTheBox CAPE
        • eJPTv2
        • Certified Ethical Hacker
        • PNPT Study Notes
      • Blue Team
        • COMPTIA Security+ SY0-701
        • Microsoft Cyber Security Analyst SC-900
        • HackTheBox CDSA
        • TryHackMe SAL1
        • Security Blue Team Level 1
        • Certified Cyber Defender (CCD)
        • COMPTIA CySA+
        • GIAC Security Essentials
        • Splunk SPLK 5001
      • Management
        • CISSP
      • IT
        • CCNA 200-301
    • Red Team Notes
      • Burp Suite Practical Study Notes
      • Metasploit Framework Study Guide & Notes in PDF
      • Buffer Overflow & Binary Exploitation Techniques | Methodology and Practical Notes
      • The Shells Study Notes
    • Blue Team Notes
      • Windows Active Directory | Security & Auditing
      • Blue Team & SOC Analyst Study Notes
      • Snort IDS Study Notes
      • Splunk SIEM Study Notes
      • Network Traffic Analysis Study Notes
      • Wazuh SIEM Study Notes
      • Wireshark Study Notes
    • Anonymity & Privacy
      • How to be anonymous and untraceable
    • Computer Forensics
      • Computer & Cyber Forensics Study Notes
      • Open Source Intelligence (OSINT) Study Notes
    • Digital Marketing & Data Analytics
      • Data Analytics Field Notes
    • Tech & IT
      • Master ChatGPT & Gemini Prompts
      • Powershell Study Guide
    • Practice Tests
      • COMPTIA Pentest+
      • COMPTIA Security+
  • Online Courses
    • Paid
      • Mastering AI for Cybersecurity Course
      • Master Cybersecurity & Ethical Hacking Courses Bundle
      • The Complete Splunk SIEM Course Online with Practical Scenarios
      • Windows Privilege Escalation Techniques Course
      • The Complete Practical Metasploit Framework Course
      • The Complete Practical Web Application Penetration Testing Course
      • The Complete Penetration Testing with Backbox Linux Course
    • Free
      • OSINT Mini Course
      • Wireshark Mini Course
      • Assembly Short Mini Course
      • Malware Analysis
      • Nmap Scanner
  • Blog
    • CyberSecurity Articles
    • CTF Writeups Walkthrough
    • Tech Articles
  • Terms of Service
  • About us
    • Contact Details
    • Digital Marketing Freelancer / Agency
  • Home
  • The MasterMinds Notes
  • Page 38

Highlight

Cybersecurity Certifications in 2025: Hands-On vs. HR-Friendly | Reviewing HackTheBox CJCA
Cybersecurity Certifications in 2025: Hands-On vs. HR-Friendly | Reviewing HackTheBox CJCA
Lockbit Ransomware Analysis with ANY.RUN
Lockbit Ransomware Analysis with ANY.RUN
Google Cyber Security or CompTIA Security+? Here’s What Recruiters Are REALLY Looking For
Google Cyber Security or CompTIA Security+? Here’s What Recruiters Are REALLY Looking For
TryHackMe PT1 vs HackTheBox CPTS vs OSCP | Review
TryHackMe PT1 vs HackTheBox CPTS vs OSCP | Review
TryHackMe PT1 Certification Review
TryHackMe PT1 Certification Review
HTB CDSA VS THM SAL1 | Review & Comparison
HTB CDSA VS THM SAL1 | Review & Comparison
Cybersecurity Roadmap 2025 | From Beginner to Advanced
Cybersecurity Roadmap 2025 | From Beginner to Advanced
HackTheBox CDSA vs BTL2: Which One You Should Pursue?
HackTheBox CDSA vs BTL2: Which One You Should Pursue?
Cybersecurity Certifications in 2025: Hands-On vs. HR-Friendly | Reviewing HackTheBox CJCA
Cybersecurity Certifications in 2025: Hands-On vs. HR-Friendly | Reviewing HackTheBox CJCA
Lockbit Ransomware Analysis with ANY.RUN
Lockbit Ransomware Analysis with ANY.RUN
Google Cyber Security or CompTIA Security+? Here’s What Recruiters Are REALLY Looking For
Google Cyber Security or CompTIA Security+? Here’s What Recruiters Are REALLY Looking For
TryHackMe PT1 vs HackTheBox CPTS vs OSCP | Review
TryHackMe PT1 vs HackTheBox CPTS vs OSCP | Review
TryHackMe PT1 Certification Review
TryHackMe PT1 Certification Review
HTB CDSA VS THM SAL1 | Review & Comparison
HTB CDSA VS THM SAL1 | Review & Comparison
Cybersecurity Roadmap 2025 | From Beginner to Advanced
Cybersecurity Roadmap 2025 | From Beginner to Advanced
HackTheBox CDSA vs BTL2: Which One You Should Pursue?
HackTheBox CDSA vs BTL2: Which One You Should Pursue?
How to Perform Windows Active Directory Penetration Testing | Cybeseclabs Secret
CTF Writeups Walkthrough CyberSecurity Articles

How to Perform Windows Active Directory Penetration Testing | Cybeseclabs Secret

Active Directory Penetration Testing, CTF Writeups, cyberseclabs, Cybeseclabs Secret, Penetration Testing
Read More
Cyber Incident Response with Splunk | TryHackMe Incident Handling with Splunk
CTF Writeups Walkthrough CyberSecurity Articles
CTF Writeups, splunk, TryHackMe Incident Handling with Splunk, TryHackMe SOC Level 1 Walkthrough, TryHackMe Walkthrough 0 Comments

Cyber Incident Response with Splunk | TryHackMe Incident Handling with Splunk

Read More
Firmware Vulnerability Scanning & Security Testing with BugProve
CTF Writeups Walkthrough CyberSecurity Articles
BugProve IoT Scanner, Hardware Hacking, Penetration Testing 0 Comments

Firmware Vulnerability Scanning & Security Testing with BugProve

Read More
Port Knocking & Wireshark Packet Analysis | Moria Vulnhub CTF Walkthrough solution
CTF Writeups Walkthrough CyberSecurity Articles
CTF Writeups, Cyberry Vulnhub Walkthrough, Moria Vulnhub Walkthrough, Penetration Testing, Port Knocking, vulnhub 0 Comments

Port Knocking & Wireshark Packet Analysis | Moria Vulnhub CTF Walkthrough solution

Read More
Port Knocking | Cyberry Vulnhub CTF Walkthrough P1
CTF Writeups Walkthrough CyberSecurity Articles
CTF Writeups, Cyberry Vulnhub Walkthrough, Penetration Testing, Port Knocking, vulnhub 0 Comments

Port Knocking & Binary Exploitation | Cyberry Vulnhub CTF Walkthrough

Read More
SSH Log File Poisoning | The Ether: Evil Science Vulnhub CTF walkthrough
CTF Writeups Walkthrough CyberSecurity Articles
CTF Writeups, Log File Poisoning, Penetration Testing, vulnhub 0 Comments

SSH Log File Poisoning | The Ether: Evil Science Vulnhub CTF walkthrough

Read More
Log File Poisoning | G0rmint Vulnhub CTF Walkthrough
CTF Writeups Walkthrough CyberSecurity Articles
CTF Writeups, Log File Poisoning, Penetration Testing, vulnhub 0 Comments

Log File Poisoning | G0rmint Vulnhub CTF Walkthrough

Read More
JSP OS command injection | Depth Vulnub CTF Walkthrough
CTF Writeups Walkthrough CyberSecurity Articles
command injection, CTF Writeups, Penetration Testing, vulnhub 0 Comments

JSP OS command injection | Depth Vulnub CTF Walkthrough

Read More
Directory Traversal with Dirbuster | D0not5top Vulnhub CTF Walkthrough
CTF Writeups Walkthrough CyberSecurity Articles
CTF Writeups, Directory Traversal, Penetration Testing, vulnhub 0 Comments

Directory Traversal with Dirbuster | D0not5top Vulnhub CTF Walkthrough

Read More
Web Application Exploitation | EP1 | C0m80 Vulnhub CTF challenge
CTF Writeups Walkthrough CyberSecurity Articles
CTF Writeups, Penetration Testing, vulnhub 0 Comments

Metasploitable 1 | Complete Walkthrough Tutorial

Read More

Posts pagination

1 … 37 38 39 … 81

Contact Details

Email Address:

consultation@motasem-notes.net

 

  • Home
  • Study Notes
  • Online Courses
  • Blog
  • Terms of Service
  • About us

NewsBlogger - Magazine & Blog WordPress Theme 2025 | Powered By SpiceThemes