My Journey into Cybersecurity: From Curiosity to Ethical Hacking - avnish Singh
920 words
5 minutes
My Journey into Cybersecurity: From Curiosity to Ethical Hacking

My Journey into Cybersecurity: From Curiosity to Ethical Hacking#

How It All Started#

Growing up, I was always fascinated by computers and technology. But it wasn’t until I encountered the concept of ethical hacking that I found my true passion. The idea that you could legally break into systems to help protect them fascinated me. This led me down the path of learning how systems work, how they’re vulnerable, and how to defend them.

The First Steps#

I started like many do—completely clueless about what the world of cybersecurity entailed. My first exposure came through online tutorials and courses where I was introduced to basic networking concepts and tools like Wireshark. This set the foundation for what would become my passion for ethical hacking and security research.

Key Milestones in My Learning Journey:

  • Python Programming: My journey began with learning Python. I realized that to truly understand how to hack and defend systems, I needed strong programming skills. Python turned out to be the perfect language because of its versatility and ease of learning.
  • Linux Mastery: Understanding the core of the Linux operating system was essential. Most security tools are built for Linux, and it’s also the go-to OS for ethical hackers.
  • Bash Scripting: Automating tasks using Bash scripts became one of the most important skills I developed. It allowed me to perform routine tasks quickly and efficiently.
  • Networking Knowledge: Learning how networks function—how data moves across systems—was critical. Tools like Nmap and Wireshark helped me understand vulnerabilities in networks and how to identify threats.

Diving Deeper: Ethical Hacking and Penetration Testing#

After mastering the basics, I started exploring more advanced topics like penetration testing and vulnerability analysis. This was where my real interest in cybersecurity began to blossom. Using tools like Metasploit, I could simulate attacks on vulnerable systems, which gave me a deeper understanding of security flaws.

Here’s a breakdown of the tools and techniques I regularly use:

1. Wireshark#

Wireshark is an essential tool for network traffic analysis. It allows you to capture and examine packets flowing through a network in real time. This helps in identifying vulnerabilities and possible security breaches.

I spent a lot of time learning how to filter packets, understand protocols, and identify unusual traffic patterns. Some of the key things I’ve learned include:

  • Detecting man-in-the-middle attacks
  • Recognizing malicious payloads in network traffic
  • Understanding various network protocols and how attackers exploit them

2. Nmap#

Nmap became my go-to tool for network scanning and identifying open ports and services. It’s incredibly powerful for mapping out the attack surface of a network.

Here are some Nmap features I’ve explored:

  • Port scanning to discover services running on a network
  • Version detection to identify vulnerable services
  • Script scanning to automate vulnerability detection
  • Firewall evasion techniques to bypass security measures

3. Metasploit#

Metasploit is a tool that every ethical hacker should know. It helps in exploiting vulnerabilities in systems, allowing you to test their security.

I’ve used Metasploit to:

  • Perform penetration tests on systems in a safe environment
  • Simulate real-world attacks, helping me understand how to defend against them
  • Discover exploits and write scripts to target vulnerabilities

Overcoming Challenges#

One of the biggest challenges I faced was understanding the depth and breadth of the cybersecurity field. It’s easy to get overwhelmed by the number of tools, techniques, and vulnerabilities you need to understand. Here’s how I overcame this:

  1. Structured Learning: I followed a structured learning approach, focusing on one topic at a time. I dedicated time to Python, then moved on to Linux, and eventually to more advanced topics like penetration testing.

  2. Hands-on Practice: Cybersecurity is a field where practical experience matters a lot. I’ve spent countless hours practicing on platforms like Hack The Box and TryHackMe, which provide real-world environments to test your skills.

  3. Academic Pursuit: I completed my high school and 12th from a local school, where I developed a strong foundation in science and technology. Currently, I am pursuing my Bachelor’s degree in Computer Science, which I expect to complete by 2025. This academic journey has given me a solid theoretical base in cybersecurity, programming, and related fields.

  4. Community Engagement: I joined forums, subreddits, and online communities where I could learn from others. I realized that asking questions and discussing problems with peers helped me grow faster.

Certifications and Learning Resources#

One major milestone in my career was earning the ** Google Cybersecurity Professional Certificate** certification from Goolge. It solidified my knowledge and helped me gain credibility in the field. If you’re interested in pursuing cybersecurity, I highly recommend exploring certifications to validate your skills.

Apart from formal certifications, I’ve taken several online courses, including:

  • The Ultimate Red Team Cybersuite Bundle (EC-Council)
  • Certified in Cybersecurity (CC) (ISC2)
  • Bash essentials (Linkedin learnning)

The Future: What’s Next?#

Cybersecurity is a rapidly evolving field, and I’m committed to staying ahead of the curve. In the coming months, I plan to:

  • Dive deeper into Red Teaming and Threat Hunting.
  • Expand my knowledge in Web Application Security by exploring tools like Burp Suite.
  • Continue developing my programming skills, particularly in automation and scripting.

Final Thoughts#

My journey into cybersecurity is far from over, and I’m excited to see where it takes me. Every day is an opportunity to learn something new and sharpen my skills.

If you’re passionate about cybersecurity or considering entering the field, I encourage you to start with the basics and build your foundation. The path can be challenging, but it’s also incredibly rewarding.

I hope this blog post inspires you to explore the fascinating world of ethical hacking and cybersecurity. Stay tuned for more updates as I continue my journey!


Thank you for reading! Feel free to share your thoughts or reach out if you have any questions or want to discuss cybersecurity topics.

My Journey into Cybersecurity: From Curiosity to Ethical Hacking
https://blog.avnishsingh.tech/posts/my-cybersecurity-journy/
Author
Avnish Singh
Published at
2024-09-27