-----
Sharing My Journey to a First Cybersecurity Job
Open to tips, advice, and connections!
-----
#infosec #pentest #hacking
✅Completed: Wazuh
Wow! I didn’t realize such a powerful open-source EDR solution existed. Wazuh can do so much - from auditing common vulnerabilities to monitoring suspicious activity and detecting behavioral anomalies.
📊Total rooms done: 47
✅Completed: Wazuh
Wow! I didn’t realize such a powerful open-source EDR solution existed. Wazuh can do so much - from auditing common vulnerabilities to monitoring suspicious activity and detecting behavioral anomalies.
📊Total rooms done: 47
✅Completed: Snort
Great introduction to IDS/IPS! Learned how to use Snort, write rules, and investigate threats.
📊Total rooms done: 45
✅Completed: Snort
Great introduction to IDS/IPS! Learned how to use Snort, write rules, and investigate threats.
📊Total rooms done: 45
✅Completed: Linux Privilege Escalation
Time to complete 50 min? Really? Took me a couple of hours, but definitely worth it. Learned a lot!
📊Total rooms done: 36
✅Completed: Linux Privilege Escalation
Time to complete 50 min? Really? Took me a couple of hours, but definitely worth it. Learned a lot!
📊Total rooms done: 36
✅Completed: Active Reconnaissance
Easy room with simple tools like traceroute, telnet and netcat
📊Total rooms done: 33
✅Completed: Active Reconnaissance
Easy room with simple tools like traceroute, telnet and netcat
📊Total rooms done: 33
✅Completed: Burp Suite: Repeater, Passive Reconnaissance
Burp Suite is a must-have for any penetration tester. I definitely need to spend more time exploring its features.
📊Total rooms done: 32
✅Completed: Burp Suite: Repeater, Passive Reconnaissance
Burp Suite is a must-have for any penetration tester. I definitely need to spend more time exploring its features.
📊Total rooms done: 32
✅Completed: Pentesting Fundamentals, SQL Injection
The room with SQL Injections was really interesting, but the process of enumerating all combinations of db, table, and user names felt tedious.
📊Total rooms done: 30
✅Completed: Pentesting Fundamentals, SQL Injection
The room with SQL Injections was really interesting, but the process of enumerating all combinations of db, table, and user names felt tedious.
📊Total rooms done: 30
✅Completed: Security Principles
Got familiar with CIA Triad and DAD model and different security principles such as Defense in Depth, Trust but Verify, and Zero Trust.
📊Total rooms done: 27
✅Completed: Security Principles
Got familiar with CIA Triad and DAD model and different security principles such as Defense in Depth, Trust but Verify, and Zero Trust.
📊Total rooms done: 27
✅Completed: CyberChef The Basics
CyberChef is an awesome Swiss Army knife for data transformation, encoding/decoding, and quick analysis. Definitely a must-have in any security toolkit!
📊Total rooms done: 26
✅Completed: CyberChef The Basics
CyberChef is an awesome Swiss Army knife for data transformation, encoding/decoding, and quick analysis. Definitely a must-have in any security toolkit!
📊Total rooms done: 26
✅Completed: Introduction to SIEM
Gained a general overview of what SIEM is and how it works
📊Total rooms done: 25
✅Completed: Introduction to SIEM
Gained a general overview of what SIEM is and how it works
📊Total rooms done: 25
✅ Completed: SOC Fundamentals, Hydra
Got a quick overview of SOC, its role in cybersecurity, and how detection and response work.
Learned how to use Hydra for online password cracking. With just a single command, you can easily crack weak passwords.
📊 Total rooms done: 24
✅ Completed: SOC Fundamentals, Hydra
Got a quick overview of SOC, its role in cybersecurity, and how detection and response work.
Learned how to use Hydra for online password cracking. With just a single command, you can easily crack weak passwords.
📊 Total rooms done: 24
✅ Completed: OWASP Top 10
This room is super helpful, teaching the most common vulnerabilities and how to exploit them. The hacking challenges are interesting. I highly recommend it.
📊Total rooms done: 22
✅ Completed: OWASP Top 10
This room is super helpful, teaching the most common vulnerabilities and how to exploit them. The hacking challenges are interesting. I highly recommend it.
📊Total rooms done: 22
✅ Completed: Web Application Basics
Learned the core structure of web apps + how HTTP requests/responses work.
📊Total rooms done: 21
✅ Completed: Web Application Basics
Learned the core structure of web apps + how HTTP requests/responses work.
📊Total rooms done: 21
After 15 days on #TryHackMe, I successfully hacked my first machine.
After 15 days on #TryHackMe, I successfully hacked my first machine.
“Turn on login alerts for your accounts! Get notified if someone logs into your account from a new device.”
🔒 Stay secure
“Turn on login alerts for your accounts! Get notified if someone logs into your account from a new device.”
🔒 Stay secure
“Keep software & OS updated! Updates patch security vulnerabilities. Don’t ignore them!”
🔒 Stay secure
“Keep software & OS updated! Updates patch security vulnerabilities. Don’t ignore them!”
🔒 Stay secure
“Use a VPN on public WiFi! Hackers can spy on unprotected networks. Secure your connection.”
🔒 Stay secure
“Use a VPN on public WiFi! Hackers can spy on unprotected networks. Secure your connection.”
🔒 Stay secure
“Banks & companies won’t ask for passwords via email or SMS! If they do, it's a scam.”
🔒 Stay secure
“Banks & companies won’t ask for passwords via email or SMS! If they do, it's a scam.”
🔒 Stay secure
Looking to connect with fellow security enthusiasts. If you're into:
🔹 Cybersecurity
🔹 Pentesting
🔹 Ethical hacking
🔹 Bug hunting
🔹 Internet security
Let’s learn & grow together! Drop a 👋 if you're in! #CyberSecurity #EthicalHacking
Looking to connect with fellow security enthusiasts. If you're into:
🔹 Cybersecurity
🔹 Pentesting
🔹 Ethical hacking
🔹 Bug hunting
🔹 Internet security
Let’s learn & grow together! Drop a 👋 if you're in! #CyberSecurity #EthicalHacking
“Think before you click! Phishing emails often create urgency. Verify links before clicking.”
🔒 Stay secure
#CyberSecurity #InfoSec
“Think before you click! Phishing emails often create urgency. Verify links before clicking.”
🔒 Stay secure
#CyberSecurity #InfoSec