Trending
WiLLson  โžŸ ๐Ÿ‘จโ€๐Ÿ’ป ๐Ÿ's Avatar

WiLLson โžŸ ๐Ÿ‘จโ€๐Ÿ’ป ๐Ÿ

@themeek766

๐Ÿ‘จ๐Ÿฝโ€๐Ÿ’ป| I write about Tech, SOC workflows, SIEM alerts, threat analysis, and incident response so you can think like a blue-team analyst.

224
Followers
223
Following
3,363
Posts
15.03.2025
Joined
Posts Following

Latest posts by WiLLson โžŸ ๐Ÿ‘จโ€๐Ÿ’ป ๐Ÿ @themeek766

Although simple, it reinforced the importance of basic navigation and file inspection when exploring a system.

4/
Lesson Learned:
Understanding core Linux commands such as ls and cat is essential for beginners in cybersecurity and penetration testing.

5/
Tools/Commands Used:
ls
cat

13.03.2026 04:53 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

By listing files with ls and reading the contents with cat, I was able to locate and extract the password.

3/
This challenge introduced me to the fundamentals of interacting with a Linux environment from the command line.

13.03.2026 04:53 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

The objective of Level 0 was to retrieve the password stored in a file called readme.

2/
After logging into the remote system through SSH, I navigated the directory using basic Linux commands.

13.03.2026 04:53 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image Post image

30-Day Cybersecurity Learning Journey
OverTheWire Bandit CTF Documentation (Day 1โ€“10)

๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐—ฑ ๐Ÿงต

1/
๐—ข๐˜ƒ๐—ฒ๐—ฟ๐—ง๐—ต๐—ฒ๐—ช๐—ถ๐—ฟ๐—ฒ ๐—•๐—ฎ๐—ป๐—ฑ๐—ถ๐˜ โ€“ ๐—Ÿ๐—ฒ๐˜ƒ๐—ฒ๐—น 0 โ†’ 1 (๐——๐—ฎ๐˜† 1)
I started my cybersecurity learning journey by exploring the Bandit wargame.

13.03.2026 04:53 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Itโ€™s becoming fully comfortable in the Linux terminal while strengthening core fundamentals like:

โ€ข File systems
โ€ข Permissions
โ€ข Networking
โ€ข Command-line efficiency

Iโ€™ll also document lessons learned and progress along the way.

Small daily progress compounds fast.

Consistency builds mastery.

11.03.2026 12:50 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image Post image

๐——๐—ฎ๐—ถ๐—น๐˜† ๐—–๐—ง๐—™ ๐——๐—ถ๐˜€๐—ฐ๐—ถ๐—ฝ๐—น๐—ถ๐—ป๐—ฒ ~ ๐—ข๐˜ƒ๐—ฒ๐—ฟ๐—ง๐—ต๐—ฒ๐—ช๐—ถ๐—ฟ๐—ฒ ๐—๐—ผ๐˜‚๐—ฟ๐—ป๐—ฒ๐˜†

Real technical skill isnโ€™t built in bursts.

Itโ€™s built through consistency.

Iโ€™ve committed to 30 minutes every day to complete one OverTheWire level until I finish the entire series.

The goal isnโ€™t just solving challenges.

11.03.2026 12:50 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

๐Ÿ”… Easily Find a File in Linux

Looking for a specific file on your Linux system? ๐Ÿง

Use this command:
find / -name "filename"
This searches the entire system for your file. ๐Ÿ”

11.03.2026 10:43 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

๐—Ÿ๐—ฒ๐˜€๐˜€๐—ผ๐—ป: One anomalous network flow can save the company.

10.03.2026 09:20 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

๐—ง๐—ต๐—ฒ ๐—ฆ๐—จ๐—ฆ๐—ฃ๐—œ๐—–๐—œ๐—ข๐—จ๐—ฆ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—™๐—น๐—ผ๐˜„ โ€“ ๐——๐—ฒ๐—ฐ๐—ฒ๐—บ๐—ฏ๐—ฒ๐—ฟ ๐Ÿต, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ

SOC network logs showed one device sending unusual traffic to a rarely used external IP.

Investigation revealed malware beaconing for C2 communication.

Immediate containment stopped lateral movement and prevented data theft.

10.03.2026 09:20 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Then investigated the artifacts.

Lesson: ransomware is loud.
SOC analysts hunt the patterns.

09.03.2026 19:53 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image Post image

๐Ÿšจ๐—ฅ๐—ฎ๐—ป๐˜€๐—ผ๐—บ๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—•๐—ฒ๐—ต๐—ฎ๐˜ƒ๐—ถ๐—ผ๐—ฟ ๐—Ÿ๐—ฎ๐—ฏ (๐—•๐—ฒ๐—ด๐—ถ๐—ป๐—ป๐—ฒ๐—ฟ ๐—ฆ๐—ข๐—–)

Ransomware isnโ€™t just malware.
Itโ€™s patterns.

In a controlled lab I simulated:
โ€ข Mass file changes
โ€ข AES encryption
โ€ข Files renamed to .locked
โ€ข A ransom note dropped

09.03.2026 19:53 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

๐Ÿ’ก Instant alert showed IP + time of access
Checked Windows logs:
โ€ข 4624 โ†’ login
โ€ข 5140 โ†’ network share access
โ€ข 5145 โ†’ file access

Attack โ†’ Alert โ†’ Timeline
Lesson: Even a simple decoy can teach you how SOC detection works.

Next: connect logs to a SIEM and see alerts in one place.๏ฟผ

08.03.2026 19:06 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image Post image Post image

๐Ÿšจ Beginner SOC Lab: Catching Sneaky Access

I built a small home lab to practice as a SOC analyst.

Setup:
โ€ข Windows 11 VM (victim)
โ€ข Kali Linux VM (attacker)
โ€ข Shared โ€œHRโ€ folder with a Canarytoken inside

Simulated an attack:
โ€ข Found the SMB share
โ€ข Opened files
โ€ข Triggered the Canarytoken๏ฟผ

08.03.2026 19:06 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

๐Ÿง
๐Ÿง
๐Ÿง
๐Ÿง
๐Ÿง๐Ÿง๐Ÿง๐Ÿง

๐Ÿง๐Ÿง๐Ÿง
๐Ÿง
๐Ÿง
๐Ÿง
๐Ÿง๐Ÿง๐Ÿง

๐Ÿง ๐Ÿง
๐Ÿง๐Ÿง ๐Ÿง
๐Ÿง ๐Ÿง๐Ÿง
๐Ÿง ๐Ÿง
๐Ÿง ๐Ÿง

๐Ÿง ๐Ÿง
๐Ÿง ๐Ÿง
๐Ÿง ๐Ÿง
๐Ÿง ๐Ÿง
๐Ÿง

๐Ÿง ๐Ÿง
๐Ÿง ๐Ÿง
๐Ÿง
๐Ÿง ๐Ÿง
๐Ÿง ๐Ÿง

08.03.2026 17:10 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

3 certifications that actually get interviews:

Security+ (foundations)

AZ-900 (cloud)

Splunk Core Certified (hands-on SIEM)

TryHackMe SAL1

Forget the rest (at least for now).

07.03.2026 10:55 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

"HOW A WI-FI ROUTER WORKS"

06.03.2026 21:29 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Video thumbnail

I BET YOU DONT PAY ATTENTION TO THIS LITTLE THINGS โ€ผ๏ธ

06.03.2026 09:11 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Video thumbnail

If a hacker gain access into your system this is what they search for first

05.03.2026 13:14 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

๐—Ÿ๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐— ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜ & ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ถ๐˜€๐˜๐—ฒ๐—ป๐—ฐ๐—ฒ

Lateral movement = breaking into one system, then sneaking into others using stolen creds or tools.
Persistence = staying hidden with auto-start programs or fake accounts.
SOC teams hunt this using logs + smart detection rules ๐Ÿ›ก๏ธ

05.03.2026 05:35 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

File System Comparison

04.03.2026 09:38 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0

Yes a lots of people are fun of doing that thinking itโ€™s the right way

03.03.2026 13:31 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Common Mistakes Smart People Make

โ€ขReusing passwords
โ€ขOver-trusting biometrics
โ€ขInstalling too many browser extensions
โ€ขIgnoring firmware updates
โ€ขThinking antivirus = full protection

Security is discipline, not tools.

03.03.2026 13:26 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

The seven layers of the OSI model include:

1. The Physical layer
2. The Data Link layer
3. The Network layer
4. The Transport layer
5. The Session layer
6. The Presentation layer
6. The Application layer

02.03.2026 21:06 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image Post image Post image

Step by step, learning and practicing safely!

02.03.2026 18:11 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Then I dove into log analysis, practiced tcpdump safely, and explored system activity from a SOC perspective.

Big takeaway: real OPSEC isnโ€™t about hiding itโ€™s about awareness, discipline, and understanding your footprint. If I can see my activity, a SOC analyst can too.

02.03.2026 18:11 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Today I finished setting up my SOC lab on Kali Linux, and what a learning experience! ๐ŸŽฏ

I created a dedicated lab user socuser, disabled command history, turned off unnecessary services, and separated lab browsing from personal browsing.

02.03.2026 18:11 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image Post image Post image

Stop Confusing Bus, Star & Ring Topologies (Simple Guide)

02.03.2026 09:52 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

No one knows the effort that went into your work more than you.
Donโ€™t wait for others to acknowledge your efforts.

02.03.2026 02:54 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Monthly Milestones

Month 1
โ€ขUnderstand networking basics
โ€ขComfortable in Linux terminal

Month 2
โ€ข50+ TryHackMe rooms completed
โ€ขSecurity+ 50% complete

Month 3
โ€ขBook Security+ exam
โ€ขBuild basic home lab

Month 4โ€“6
โ€ขApply for IT/SOC roles aggressively

02.03.2026 01:08 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Package cleanup

1๏ธโƒฃ apt autoremove โ€“ remove unused
2๏ธโƒฃ apt clean โ€“ clear cache
3๏ธโƒฃ dpkg -l โ€“ list packages
4๏ธโƒฃ dpkg -r โ€“ remove package
5๏ธโƒฃ apt purge โ€“ remove configs too

Keep your system clean & fast.
Which one would you run today?

26.02.2026 23:48 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0