Although simple, it reinforced the importance of basic navigation and file inspection when exploring a system.
4/
Lesson Learned:
Understanding core Linux commands such as ls and cat is essential for beginners in cybersecurity and penetration testing.
5/
Tools/Commands Used:
ls
cat
13.03.2026 04:53
๐ 0
๐ 1
๐ฌ 0
๐ 0
By listing files with ls and reading the contents with cat, I was able to locate and extract the password.
3/
This challenge introduced me to the fundamentals of interacting with a Linux environment from the command line.
13.03.2026 04:53
๐ 0
๐ 0
๐ฌ 1
๐ 0
The objective of Level 0 was to retrieve the password stored in a file called readme.
2/
After logging into the remote system through SSH, I navigated the directory using basic Linux commands.
13.03.2026 04:53
๐ 0
๐ 0
๐ฌ 1
๐ 0
30-Day Cybersecurity Learning Journey
OverTheWire Bandit CTF Documentation (Day 1โ10)
๐ง๐ต๐ฟ๐ฒ๐ฎ๐ฑ ๐งต
1/
๐ข๐๐ฒ๐ฟ๐ง๐ต๐ฒ๐ช๐ถ๐ฟ๐ฒ ๐๐ฎ๐ป๐ฑ๐ถ๐ โ ๐๐ฒ๐๐ฒ๐น 0 โ 1 (๐๐ฎ๐ 1)
I started my cybersecurity learning journey by exploring the Bandit wargame.
13.03.2026 04:53
๐ 0
๐ 0
๐ฌ 1
๐ 0
Itโs becoming fully comfortable in the Linux terminal while strengthening core fundamentals like:
โข File systems
โข Permissions
โข Networking
โข Command-line efficiency
Iโll also document lessons learned and progress along the way.
Small daily progress compounds fast.
Consistency builds mastery.
11.03.2026 12:50
๐ 1
๐ 0
๐ฌ 1
๐ 0
๐๐ฎ๐ถ๐น๐ ๐๐ง๐ ๐๐ถ๐๐ฐ๐ถ๐ฝ๐น๐ถ๐ป๐ฒ ~ ๐ข๐๐ฒ๐ฟ๐ง๐ต๐ฒ๐ช๐ถ๐ฟ๐ฒ ๐๐ผ๐๐ฟ๐ป๐ฒ๐
Real technical skill isnโt built in bursts.
Itโs built through consistency.
Iโve committed to 30 minutes every day to complete one OverTheWire level until I finish the entire series.
The goal isnโt just solving challenges.
11.03.2026 12:50
๐ 0
๐ 0
๐ฌ 1
๐ 0
๐
Easily Find a File in Linux
Looking for a specific file on your Linux system? ๐ง
Use this command:
find / -name "filename"
This searches the entire system for your file. ๐
11.03.2026 10:43
๐ 0
๐ 0
๐ฌ 0
๐ 0
๐๐ฒ๐๐๐ผ๐ป: One anomalous network flow can save the company.
10.03.2026 09:20
๐ 0
๐ 0
๐ฌ 0
๐ 0
๐ง๐ต๐ฒ ๐ฆ๐จ๐ฆ๐ฃ๐๐๐๐ข๐จ๐ฆ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ ๐๐น๐ผ๐ โ ๐๐ฒ๐ฐ๐ฒ๐บ๐ฏ๐ฒ๐ฟ ๐ต, ๐ฎ๐ฌ๐ฎ๐ฑ
SOC network logs showed one device sending unusual traffic to a rarely used external IP.
Investigation revealed malware beaconing for C2 communication.
Immediate containment stopped lateral movement and prevented data theft.
10.03.2026 09:20
๐ 1
๐ 0
๐ฌ 1
๐ 0
Then investigated the artifacts.
Lesson: ransomware is loud.
SOC analysts hunt the patterns.
09.03.2026 19:53
๐ 0
๐ 0
๐ฌ 0
๐ 0
๐จ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ ๐๐ฒ๐ต๐ฎ๐๐ถ๐ผ๐ฟ ๐๐ฎ๐ฏ (๐๐ฒ๐ด๐ถ๐ป๐ป๐ฒ๐ฟ ๐ฆ๐ข๐)
Ransomware isnโt just malware.
Itโs patterns.
In a controlled lab I simulated:
โข Mass file changes
โข AES encryption
โข Files renamed to .locked
โข A ransom note dropped
09.03.2026 19:53
๐ 1
๐ 0
๐ฌ 1
๐ 0
๐ก Instant alert showed IP + time of access
Checked Windows logs:
โข 4624 โ login
โข 5140 โ network share access
โข 5145 โ file access
Attack โ Alert โ Timeline
Lesson: Even a simple decoy can teach you how SOC detection works.
Next: connect logs to a SIEM and see alerts in one place.๏ฟผ
08.03.2026 19:06
๐ 0
๐ 0
๐ฌ 0
๐ 0
๐ง
๐ง
๐ง
๐ง
๐ง๐ง๐ง๐ง
๐ง๐ง๐ง
๐ง
๐ง
๐ง
๐ง๐ง๐ง
๐ง ๐ง
๐ง๐ง ๐ง
๐ง ๐ง๐ง
๐ง ๐ง
๐ง ๐ง
๐ง ๐ง
๐ง ๐ง
๐ง ๐ง
๐ง ๐ง
๐ง
๐ง ๐ง
๐ง ๐ง
๐ง
๐ง ๐ง
๐ง ๐ง
08.03.2026 17:10
๐ 1
๐ 0
๐ฌ 0
๐ 0
3 certifications that actually get interviews:
Security+ (foundations)
AZ-900 (cloud)
Splunk Core Certified (hands-on SIEM)
TryHackMe SAL1
Forget the rest (at least for now).
07.03.2026 10:55
๐ 0
๐ 0
๐ฌ 0
๐ 0
"HOW A WI-FI ROUTER WORKS"
06.03.2026 21:29
๐ 0
๐ 0
๐ฌ 1
๐ 0
I BET YOU DONT PAY ATTENTION TO THIS LITTLE THINGS โผ๏ธ
06.03.2026 09:11
๐ 1
๐ 0
๐ฌ 1
๐ 0
If a hacker gain access into your system this is what they search for first
05.03.2026 13:14
๐ 1
๐ 0
๐ฌ 1
๐ 0
๐๐ฎ๐๐ฒ๐ฟ๐ฎ๐น ๐ ๐ผ๐๐ฒ๐บ๐ฒ๐ป๐ & ๐ฃ๐ฒ๐ฟ๐๐ถ๐๐๐ฒ๐ป๐ฐ๐ฒ
Lateral movement = breaking into one system, then sneaking into others using stolen creds or tools.
Persistence = staying hidden with auto-start programs or fake accounts.
SOC teams hunt this using logs + smart detection rules ๐ก๏ธ
05.03.2026 05:35
๐ 0
๐ 0
๐ฌ 0
๐ 0
File System Comparison
04.03.2026 09:38
๐ 0
๐ 0
๐ฌ 2
๐ 0
Yes a lots of people are fun of doing that thinking itโs the right way
03.03.2026 13:31
๐ 0
๐ 0
๐ฌ 0
๐ 0
Common Mistakes Smart People Make
โขReusing passwords
โขOver-trusting biometrics
โขInstalling too many browser extensions
โขIgnoring firmware updates
โขThinking antivirus = full protection
Security is discipline, not tools.
03.03.2026 13:26
๐ 2
๐ 1
๐ฌ 1
๐ 0
The seven layers of the OSI model include:
1. The Physical layer
2. The Data Link layer
3. The Network layer
4. The Transport layer
5. The Session layer
6. The Presentation layer
6. The Application layer
02.03.2026 21:06
๐ 1
๐ 0
๐ฌ 0
๐ 0
Then I dove into log analysis, practiced tcpdump safely, and explored system activity from a SOC perspective.
Big takeaway: real OPSEC isnโt about hiding itโs about awareness, discipline, and understanding your footprint. If I can see my activity, a SOC analyst can too.
02.03.2026 18:11
๐ 0
๐ 0
๐ฌ 1
๐ 0
Today I finished setting up my SOC lab on Kali Linux, and what a learning experience! ๐ฏ
I created a dedicated lab user socuser, disabled command history, turned off unnecessary services, and separated lab browsing from personal browsing.
02.03.2026 18:11
๐ 0
๐ 0
๐ฌ 1
๐ 0
Stop Confusing Bus, Star & Ring Topologies (Simple Guide)
02.03.2026 09:52
๐ 2
๐ 0
๐ฌ 0
๐ 0
No one knows the effort that went into your work more than you.
Donโt wait for others to acknowledge your efforts.
02.03.2026 02:54
๐ 1
๐ 1
๐ฌ 0
๐ 0
Monthly Milestones
Month 1
โขUnderstand networking basics
โขComfortable in Linux terminal
Month 2
โข50+ TryHackMe rooms completed
โขSecurity+ 50% complete
Month 3
โขBook Security+ exam
โขBuild basic home lab
Month 4โ6
โขApply for IT/SOC roles aggressively
02.03.2026 01:08
๐ 0
๐ 0
๐ฌ 0
๐ 0
Package cleanup
1๏ธโฃ apt autoremove โ remove unused
2๏ธโฃ apt clean โ clear cache
3๏ธโฃ dpkg -l โ list packages
4๏ธโฃ dpkg -r โ remove package
5๏ธโฃ apt purge โ remove configs too
Keep your system clean & fast.
Which one would you run today?
26.02.2026 23:48
๐ 2
๐ 0
๐ฌ 0
๐ 0