<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Urah</title>
    <description>The latest articles on DEV Community by Urah (@b3secur3).</description>
    <link>https://dev.to/b3secur3</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1935698%2F24c0377a-76b3-4d30-b156-728d81572c9b.jpg</url>
      <title>DEV Community: Urah</title>
      <link>https://dev.to/b3secur3</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/b3secur3"/>
    <language>en</language>
    <item>
      <title>Starting Out in Cybersecurity: My Journey and First Steps</title>
      <dc:creator>Urah</dc:creator>
      <pubDate>Fri, 16 Aug 2024 10:10:26 +0000</pubDate>
      <link>https://dev.to/b3secur3/starting-out-in-cybersecurity-my-journey-and-first-steps-4oj8</link>
      <guid>https://dev.to/b3secur3/starting-out-in-cybersecurity-my-journey-and-first-steps-4oj8</guid>
      <description>&lt;p&gt;🚀 Introduction&lt;br&gt;
Embarking on a journey into cybersecurity can feel like stepping into an expansive, thrilling universe. For me, the spark was ignited by a deep-seated fascination with technology, but it wasn’t until I discovered cybersecurity that I found my true passion. In this post, I’ll walk you through the first steps I took, the resources that became my compass, and how you too can find your footing in this ever-evolving field.&lt;/p&gt;




&lt;p&gt;🔍 Finding My Path&lt;br&gt;
Cybersecurity is a vast field with endless possibilities, which can be both exciting and overwhelming. Where do you begin? For me, the first step was laying a strong foundation in the basics—understanding computer systems, networking, and operating systems, particularly Linux. I quickly realized that a structured learning approach was key to navigating this complex landscape.&lt;/p&gt;




&lt;p&gt;🎓 Essential Resources for Beginners&lt;br&gt;
What truly accelerated my learning were the hands-on platforms and resources that provided real-world experience and practical insights. Here’s a curated list of the resources that were game-changers for me:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://referral.hackthebox.com/mz9e5b8" rel="noopener noreferrer"&gt;Hack The Box&lt;/a&gt;: If you’re serious about penetration testing, this platform is a must. It offers real-world labs where you can practice your skills in a legal, controlled environment.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://tryhackme.com/" rel="noopener noreferrer"&gt;TryHackMe&lt;/a&gt;: Perfect for beginners, this platform offers guided labs and challenges that walk you through cybersecurity concepts step-by-step.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.cybrary.it?referral=3f203744-90a5-4ea2-b5a1-8b23419d9189&amp;amp;source=link" rel="noopener noreferrer"&gt;Cybrary&lt;/a&gt;: A treasure trove of free courses covering a wide range of cybersecurity topics. It’s a great place to dive deeper into specific areas of interest.&lt;/p&gt;

&lt;p&gt;YouTube Channels: Channels like &lt;a href="https://www.youtube.com/@NetworkChuck" rel="noopener noreferrer"&gt;NetworkChuck&lt;/a&gt;, &lt;a href="https://www.youtube.com/c/thecybermentor" rel="noopener noreferrer"&gt;The Cyber Mentor&lt;/a&gt;, and &lt;a href="https://www.youtube.com/@_JohnHammond" rel="noopener noreferrer"&gt;John Hammond&lt;/a&gt; provide invaluable tutorials, tips, and demonstrations that help bridge the gap between theory and practice.&lt;/p&gt;




&lt;p&gt;🎯 Setting Goals &amp;amp; Staying on Track&lt;br&gt;
To prevent information overload and ensure steady progress, I set clear, actionable goals. I broke down my learning journey into short-term objectives, such as completing specific courses or labs, and long-term goals like earning certifications and building a portfolio. This approach not only kept me motivated but also gave me a clear direction to follow.&lt;/p&gt;




&lt;p&gt;💬 Conclusion &amp;amp; Next Steps&lt;br&gt;
Starting out in cybersecurity may seem daunting, but with the right resources and a strategic approach, it’s a challenge that’s absolutely within your reach. I’m excited to continue sharing my journey with you. In the next post, I’ll delve into the essential tools that every cybersecurity professional should have in their toolkit—both free and paid. Stay tuned, and don’t hesitate to reach out if you’re on a similar path. Let’s grow together!&lt;/p&gt;




&lt;p&gt;If you found this post helpful, follow my blog to stay updated on the next steps of my cybersecurity journey. You can also connect with me on &lt;a href="https://x.com/B3secur3" rel="noopener noreferrer"&gt;Twitter&lt;/a&gt; for real-time updates, tips, and discussions about the cybersecurity field.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>learningjourney</category>
      <category>careeradvice</category>
    </item>
    <item>
      <title>Examining Data About the Linux System</title>
      <dc:creator>Urah</dc:creator>
      <pubDate>Fri, 16 Aug 2024 09:08:26 +0000</pubDate>
      <link>https://dev.to/b3secur3/examining-data-about-the-linux-system-3g5c</link>
      <guid>https://dev.to/b3secur3/examining-data-about-the-linux-system-3g5c</guid>
      <description>&lt;p&gt;As part of my journey in cybersecurity, I have learned about the complexity of Linux systems. Both system administration and security assessment require a thorough understanding of a system's design, operations, and configurations. Here's a quick list of some of the most significant Linux commands I have learned.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fundamental System Details&lt;/strong&gt;&lt;br&gt;
whoami: Instantaneously show the active username. It is important to know what privileges you might have while gaining access to a system.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;whoami
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Whoami is extended with id, which shows the user's ID and group memberships. When auditing account permissions, this information is quite helpful.&lt;/p&gt;

&lt;p&gt;The hostname of the system you are currently logged into is printed or set. Easy to use but efficient for machine identification.&lt;/p&gt;

&lt;p&gt;uname: This command yields comprehensive system information, including the name and version of the kernel and hardware specifications. When evaluating possible kernel vulnerabilities, the -a flag is useful because it shows all accessible information.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;uname -a
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Networking Insights&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ifconfig: For viewing and configuring network setups and network interface settings. It is necessary for diagnosing problems with networks.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ifconfig
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;ip: You can control network interfaces, routing, and tunnels with this more contemporary option to ifconfig.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ip a
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Network status is shown via netstat, which also shows connections, routing tables, and interface information.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;netstat -tuln
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Another excellent tool that provides thorough information for examining sockets and network connections is ss.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ss -tuln
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Handling Devices and Processes&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;ps: Provides a list of active processes, which is helpful for debugging and keeping track of system activities.
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ps aux
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;lsblk: Provides details about block devices and a storage device hierarchy.
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;lsblk
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;lsusb and lspci: These commands help identify connected hardware by listing USB and PCI devices, respectively.
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;lsusb
lspci
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Lists of open files, or lsofs, are useful for troubleshooting system problems and looking into possible security risks.
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;lsof
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Getting Remote Access using SSH&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;One essential piece of technology that allows for safe remote access to Linux computers is SSH (Secure Shell). For those working in the disciplines of system administration and cybersecurity, it is an essential tool. One needs to be able to use SSH to log in and run commands remotely in order to perform system administration duties.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ssh username@remote_host
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;With these tools, I’m building a strong foundation in Linux system management, which is crucial for both day-to-day operations and security assessments. This knowledge will also aid in discovering vulnerabilities and misconfigurations that could lead to privilege escalation—a critical skill in penetration testing&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Mastering these Linux commands is just the beginning of my cybersecurity journey. If you're also exploring Linux or cybersecurity, I'd love to hear your thoughts! What are your go-to commands? Connect with me on &lt;a href="https://x.com/B3secur3" rel="noopener noreferrer"&gt;Twitter&lt;/a&gt; and let’s share knowledge.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>linux</category>
      <category>devops</category>
      <category>infosec</category>
    </item>
  </channel>
</rss>
