1 Foundations

It is the practice of protecting systems, networks, and programs from digital attacks. The core goal is the CIA Triad: Confidentiality (only authorized access), Integrity (data is not tampered with), and Availability (systems are up and running).

White Hat: Ethical hackers hired to find vulnerabilities and fix them.

Black Hat: Malicious hackers who exploit flaws for personal gain or damage.

Grey Hat: Operated without permission but often without malicious intent, though still illegal.

Attack Surface: The sum of all points where an unauthorized user can try to enter data or extract data (e.g., open ports, input fields).

Threat Modeling: A structured approach to identifying potential threats to a system and prioritizing mitigations.

You cannot secure what you don't understand.
- IP: The address of a computer.
- DNS: The phonebook translating domains (google.com) to IPs.
- HTTP: The protocol for web communication. Secure it with HTTPS/TLS.

2 Operating Systems & Linux

Linux is the OS of the internet.
Filesystem: Starts at root /. Key folders: /etc (config), /var (logs), /home (users).
Permissions: Read (r), Write (w), Execute (x) for Owner, Group, Others. Crucial for limiting access.

Processes: Running programs. Use `ps` or `top` to view them.
Services (Daemons): Background processes (like a web server) managed by `systemd` (e.g., `systemctl start nginx`).

Scripting allows you to automate tasks and attacks. A simple bash script can scan a network, parse logs, or automate backups. It's an essential skill for any security professional.

3 Networking for Security

TCP: Reliable, connection-oriented (3-way handshake). Emails, Web.
UDP: Fast, connectionless, no guarantee of delivery. Streaming, DNS.
Attackers exploit these (e.g., SYN Flood attacks on TCP).

Firewall: A security device (software/hardware) that filters network traffic based on rules.
NAT (Network Address Translation): Allows private IP addresses to share a single public IP, adding a layer of obscuration.

Ports are virtual doors for services.
Common Ports: 80 (HTTP), 443 (HTTPS), 22 (SSH), 21 (FTP).
Scanning for open ports (using Nmap) is the first step in reconnaissance.

4 Web Security Basics

Understanding GET, POST, PUT, DELETE is vital. Vulnerabilities often arise when dangerous methods (like PUT/DELETE) are left enabled on public servers, or when sensitive data is passed via GET parameters (visible in history).

Used to maintain state.
Risk: Session Hijacking. If an attacker steals your session cookie, they become you.
Protection: Use `HttpOnly` and `Secure` flags on cookies.

The standard awareness document for developers. Includes:
1. Injection (SQLi)
2. Broken Authentication
3. XSS (Cross-Site Scripting)
Learning to exploit these (legally) helps you prevent them.

๐Ÿงช Practice Platforms

TryHackMe (THM)

Beginner-friendly, guided learning paths

Hack The Box (HTB)

Advanced labs for penetration testing

picoCTF

CTF-style challenges for beginners

๐ŸŽฏ Career Paths

Simulates cyberattacks on a company's system (with permission) to find weaknesses before criminals do. Often generates a report detailing vulnerabilities.

Monitors an organization's networks for security breaches. They install firewalls, encryption programs, and investigate violations.

The defensive side. SOC (Security Operations Center) analysts work 24/7 to detect, analyze, and respond to cybersecurity incidents in real-time.

Advanced offensive security. Unlike standard pentesting, Red Teams simulate full-scope, multi-layered attacks (social engineering, physical access, network breach) to test the organization's detection capabilities.

Say Hi! ๐Ÿ‘‹

Have a question or just want to connect? Drop me a message!

๐Ÿ“ง Sending to: samarth@skilledca.in
๐ŸŽ‰

Message Sent!

Thanks for reaching out! I'll get back to you soon.