Although simple, it reinforced the importance of basic navigation and file inspection when exploring a system.
4/
Lesson Learned:
Understanding core Linux commands such as ls and cat is essential for beginners in cybersecurity and penetration testing.
5/
Tools/Commands Used:
ls
cat
Posts by WiLLson โ ๐จโ๐ป ๐
By listing files with ls and reading the contents with cat, I was able to locate and extract the password.
3/
This challenge introduced me to the fundamentals of interacting with a Linux environment from the command line.
The objective of Level 0 was to retrieve the password stored in a file called readme.
2/
After logging into the remote system through SSH, I navigated the directory using basic Linux commands.
30-Day Cybersecurity Learning Journey
OverTheWire Bandit CTF Documentation (Day 1โ10)
๐ง๐ต๐ฟ๐ฒ๐ฎ๐ฑ ๐งต
1/
๐ข๐๐ฒ๐ฟ๐ง๐ต๐ฒ๐ช๐ถ๐ฟ๐ฒ ๐๐ฎ๐ป๐ฑ๐ถ๐ โ ๐๐ฒ๐๐ฒ๐น 0 โ 1 (๐๐ฎ๐ 1)
I started my cybersecurity learning journey by exploring the Bandit wargame.
Itโs becoming fully comfortable in the Linux terminal while strengthening core fundamentals like:
โข File systems
โข Permissions
โข Networking
โข Command-line efficiency
Iโll also document lessons learned and progress along the way.
Small daily progress compounds fast.
Consistency builds mastery.
๐๐ฎ๐ถ๐น๐ ๐๐ง๐ ๐๐ถ๐๐ฐ๐ถ๐ฝ๐น๐ถ๐ป๐ฒ ~ ๐ข๐๐ฒ๐ฟ๐ง๐ต๐ฒ๐ช๐ถ๐ฟ๐ฒ ๐๐ผ๐๐ฟ๐ป๐ฒ๐
Real technical skill isnโt built in bursts.
Itโs built through consistency.
Iโve committed to 30 minutes every day to complete one OverTheWire level until I finish the entire series.
The goal isnโt just solving challenges.
๐
Easily Find a File in Linux
Looking for a specific file on your Linux system? ๐ง
Use this command:
find / -name "filename"
This searches the entire system for your file. ๐
๐๐ฒ๐๐๐ผ๐ป: One anomalous network flow can save the company.
๐ง๐ต๐ฒ ๐ฆ๐จ๐ฆ๐ฃ๐๐๐๐ข๐จ๐ฆ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ ๐๐น๐ผ๐ โ ๐๐ฒ๐ฐ๐ฒ๐บ๐ฏ๐ฒ๐ฟ ๐ต, ๐ฎ๐ฌ๐ฎ๐ฑ
SOC network logs showed one device sending unusual traffic to a rarely used external IP.
Investigation revealed malware beaconing for C2 communication.
Immediate containment stopped lateral movement and prevented data theft.
Then investigated the artifacts.
Lesson: ransomware is loud.
SOC analysts hunt the patterns.
๐จ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ ๐๐ฒ๐ต๐ฎ๐๐ถ๐ผ๐ฟ ๐๐ฎ๐ฏ (๐๐ฒ๐ด๐ถ๐ป๐ป๐ฒ๐ฟ ๐ฆ๐ข๐)
Ransomware isnโt just malware.
Itโs patterns.
In a controlled lab I simulated:
โข Mass file changes
โข AES encryption
โข Files renamed to .locked
โข A ransom note dropped
๐ก Instant alert showed IP + time of access
Checked Windows logs:
โข 4624 โ login
โข 5140 โ network share access
โข 5145 โ file access
Attack โ Alert โ Timeline
Lesson: Even a simple decoy can teach you how SOC detection works.
Next: connect logs to a SIEM and see alerts in one place.๏ฟผ
๐จ Beginner SOC Lab: Catching Sneaky Access
I built a small home lab to practice as a SOC analyst.
Setup:
โข Windows 11 VM (victim)
โข Kali Linux VM (attacker)
โข Shared โHRโ folder with a Canarytoken inside
Simulated an attack:
โข Found the SMB share
โข Opened files
โข Triggered the Canarytoken๏ฟผ
๐ง
๐ง
๐ง
๐ง
๐ง๐ง๐ง๐ง
๐ง๐ง๐ง
๐ง
๐ง
๐ง
๐ง๐ง๐ง
๐ง ๐ง
๐ง๐ง ๐ง
๐ง ๐ง๐ง
๐ง ๐ง
๐ง ๐ง
๐ง ๐ง
๐ง ๐ง
๐ง ๐ง
๐ง ๐ง
๐ง
๐ง ๐ง
๐ง ๐ง
๐ง
๐ง ๐ง
๐ง ๐ง
3 certifications that actually get interviews:
Security+ (foundations)
AZ-900 (cloud)
Splunk Core Certified (hands-on SIEM)
TryHackMe SAL1
Forget the rest (at least for now).
"HOW A WI-FI ROUTER WORKS"
I BET YOU DONT PAY ATTENTION TO THIS LITTLE THINGS โผ๏ธ
If a hacker gain access into your system this is what they search for first
๐๐ฎ๐๐ฒ๐ฟ๐ฎ๐น ๐ ๐ผ๐๐ฒ๐บ๐ฒ๐ป๐ & ๐ฃ๐ฒ๐ฟ๐๐ถ๐๐๐ฒ๐ป๐ฐ๐ฒ
Lateral movement = breaking into one system, then sneaking into others using stolen creds or tools.
Persistence = staying hidden with auto-start programs or fake accounts.
SOC teams hunt this using logs + smart detection rules ๐ก๏ธ
File System Comparison
Yes a lots of people are fun of doing that thinking itโs the right way
Common Mistakes Smart People Make
โขReusing passwords
โขOver-trusting biometrics
โขInstalling too many browser extensions
โขIgnoring firmware updates
โขThinking antivirus = full protection
Security is discipline, not tools.
The seven layers of the OSI model include:
1. The Physical layer
2. The Data Link layer
3. The Network layer
4. The Transport layer
5. The Session layer
6. The Presentation layer
6. The Application layer
Step by step, learning and practicing safely!
Then I dove into log analysis, practiced tcpdump safely, and explored system activity from a SOC perspective.
Big takeaway: real OPSEC isnโt about hiding itโs about awareness, discipline, and understanding your footprint. If I can see my activity, a SOC analyst can too.
Today I finished setting up my SOC lab on Kali Linux, and what a learning experience! ๐ฏ
I created a dedicated lab user socuser, disabled command history, turned off unnecessary services, and separated lab browsing from personal browsing.
Stop Confusing Bus, Star & Ring Topologies (Simple Guide)
No one knows the effort that went into your work more than you.
Donโt wait for others to acknowledge your efforts.
Monthly Milestones
Month 1
โขUnderstand networking basics
โขComfortable in Linux terminal
Month 2
โข50+ TryHackMe rooms completed
โขSecurity+ 50% complete
Month 3
โขBook Security+ exam
โขBuild basic home lab
Month 4โ6
โขApply for IT/SOC roles aggressively
Package cleanup
1๏ธโฃ apt autoremove โ remove unused
2๏ธโฃ apt clean โ clear cache
3๏ธโฃ dpkg -l โ list packages
4๏ธโฃ dpkg -r โ remove package
5๏ธโฃ apt purge โ remove configs too
Keep your system clean & fast.
Which one would you run today?