<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Wor Yu Kai</title>
    <description>The latest articles on DEV Community by Wor Yu Kai (@clom).</description>
    <link>https://dev.to/clom</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1639337%2F6860a94e-55e6-4498-9417-0ae3e678dce9.png</url>
      <title>DEV Community: Wor Yu Kai</title>
      <link>https://dev.to/clom</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/clom"/>
    <language>en</language>
    <item>
      <title>My journey into cybersecurity</title>
      <dc:creator>Wor Yu Kai</dc:creator>
      <pubDate>Wed, 19 Jun 2024 14:39:11 +0000</pubDate>
      <link>https://dev.to/clom/my-journey-in-cybersecurity-1b07</link>
      <guid>https://dev.to/clom/my-journey-in-cybersecurity-1b07</guid>
      <description>&lt;h2&gt;
  
  
  My Journey in Cybersecurity, in chronological order
&lt;/h2&gt;

&lt;h2&gt;
  
  
  @ 11
&lt;/h2&gt;

&lt;p&gt;At the age of 11, I began to grow fascinated by how computers work, and even more intrigued by how hackers hack these intrinsically designed machines. I was introduced to the world of ethical hacking by my close friend then, who he himself was quite well versed in the topic. However, he was not an ethical hacker himself, rather he wanted to be a black hat hacker. Yet, I supposed he was not willing to take the rest, as he never attempted to break into systems illegally, which was best for him as the world of hacking is not forgiving. Black hat hacking can cause one to be arrested, and result in fines and/or even up to years in prison. &lt;/p&gt;

&lt;h2&gt;
  
  
  @ 12
&lt;/h2&gt;

&lt;p&gt;At the age of 12, I created my first Metasploit Payload, which I was attempting to use to hack the webcam on my brother's computer. However, perhaps something went wrong within the payload itself, or my brother's firewall blocked the payload, and consequently I was unable to successfully hack his webcam. I suppose my brother had already known this before hand, because he seemed confident in allowing me to try install the payload. After this incident, I spent several days trying to fix the payload, without realizing that there were other possibilities like the firewall or antivirus blocking the payload. At this point of time, I also did not know what was a port, hence I also failed to realize that the port my payload was using could have been closed.&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl4emchsp0m9f5llc0t1f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl4emchsp0m9f5llc0t1f.png" alt="Image description" width="600" height="400"&gt;&lt;/a&gt;&lt;br&gt;
 As a result of lacking ports and computing knowledge, I also tried to connect to my brother's computer via RDP(Remote Desktop Protocol), without knowing that port 3389 used for RDP was closed by his firewall, and RDP being disabled by default on his computer. It was only after trying for several hours(and failing), did I finally attempted to look up the internet for a solution to my problem. &lt;em&gt;Voila!&lt;/em&gt; I had found the solution, which was to open the port on the firewall and enable RDP! However, it was too late because my computer usage time for the week was used up. Consequently, I forgot about this short term goal of mine, until today.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RdoAmwp6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_800/https://media1.tenor.com/m/DuThn51FjPcAAAAC/nerd-emoji-nerd.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RdoAmwp6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_800/https://media1.tenor.com/m/DuThn51FjPcAAAAC/nerd-emoji-nerd.gif" alt="alt image" width="498" height="387"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  @ 13-14
&lt;/h2&gt;

&lt;p&gt;During ages 13-14, I was mainly scouring hacking forums to see how hackers think and act, and learning about the various ways they exploited systems and vulnerabilities. What shocked me was how easy it was to exploit these vulnerabilities, owing to the rise of automated hacking tools in the contemporary digital era. I fondly remember one of these tools being SQLiDumper - Which was made by AngelSecurityTeam. The tool enabled users to perform operations like Dork Searching , Vulnerability Scanning ,SQL Injection , XSS , LFI and RFI. Furthermore, it was in a GUI(Graphic User Interface), which allowed beginner 'hackers' to utilise the tool and exploit vulnerable databases, without even knowing how to do it the manual way in Linux by using the shell. Although I believe the tool was made for penetration testing by ethical hackers, many malicious users used this tool to perform data-breaches on various websites. I also noticed the uprise of hacking tools being sold by programmers, like account checkers and database dumpers/dorking tools. Unlike SQLiDumper, these tools were made by malicious creators, for malicious users, who could access these tools without prior knowledge to hacking at all. Of course, this was highly worrying, but I could not do much to stop these malicious users nor creators. Dare not I dabble in such vices, because I know the legal consequences of doing so.&lt;/p&gt;

&lt;h2&gt;
  
  
  @ 15
&lt;/h2&gt;

&lt;p&gt;I did not dabble much into cybersecurity when I was 15, as I was busy preparing and studying for my upcoming important exams. It was difficult to balance between studying and leisure during this period of time, hence I made the difficult choice to put cybersecurity aside temporarily for a while, to focus more on my studies. However, the time came during around November that year, when my mother's bank account was hacked by malicious actors. This rekindled the spirit in me for cybersecurity, as I realised how vulnerable we were, even with the utmost security protocols being put in place. 2FA and OTP are no challenge for black hat hackers in our era, hence I hopped back onto the bandwagon of cybersecurity during the End-Of-Year holidays.&lt;/p&gt;

&lt;h2&gt;
  
  
  @ 16
&lt;/h2&gt;

&lt;p&gt;Currently at 16, I aim to pursue a degree in Cybersecurity, to achieve my aim of safeguarding the collective data of innocent people, and ultimately building a more secure and safe digital haven for everyone. I have tried using HacktheBox and PicoCTF to refresh my knowledge about cybersecurity, and free courses online from Coursera, for example, do really help a lot in this aspect. I have also recently participated in a CTF competition and workshop held by YCEP(Youth Cyber Exploration Program) held in conjunction with Ngee Ann Polytechnic, and am looking forward to attend my next CTF held by CISCO this coming weekend. Although the prospect of winning is nice, it's not my ultimate goal, as I solely wish to gain knowledge and become more well versed in the field.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;My journey throughout cybersecurity thus far has been quite eventful, with there being many ups, but also many downs. What I have learnt from my journey is the importance of self-reflection, and how it is important to recognise our own mistakes and correct them. In fact, this is one of the reasons why I am writing this post; to reconcile with my past and reflect on what has built me up as a person so far. &lt;strong&gt;Perseverance&lt;/strong&gt;, &lt;strong&gt;Empathy&lt;/strong&gt;, and &lt;strong&gt;Teamwork&lt;/strong&gt; are core values that are not only important in cybersecurity, but also in all aspects of life. Ultimately, my goal is to become a &lt;strong&gt;Penetration Tester&lt;/strong&gt; in the future, as I enjoy being in the red team of cybersecurity. I may not be the best in what I do, but I am always aiming for greater heights, and not just settling for the status quo, because challenging ourselves is the only way to achieve growth.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;A Journey of a thousand miles, begins with a single step" -Lao Tzu&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>cybersecurity</category>
      <category>aboutme</category>
      <category>newbie</category>
    </item>
    <item>
      <title>Understanding Cybersecurity: A Beginner’s Guide</title>
      <dc:creator>Wor Yu Kai</dc:creator>
      <pubDate>Mon, 17 Jun 2024 13:07:30 +0000</pubDate>
      <link>https://dev.to/clom/understanding-cybersecurity-a-beginners-guide-10ji</link>
      <guid>https://dev.to/clom/understanding-cybersecurity-a-beginners-guide-10ji</guid>
      <description>&lt;p&gt;Imagine you live in a bustling city where every house is a computer, and every street represents the internet. Just as in any city, securing your house is crucial to ensure your safety and privacy. In the digital world, cybersecurity plays this critical role. Let’s explore the basics of cybersecurity through this analogy, which I learnt as an easier way to explain difficult concepts in layman terms.&lt;/p&gt;

&lt;p&gt;Public IP Addresses: Your Home Address&lt;br&gt;
  Every house in a city has a unique address, known as a public IP address, that identifies its location. This public IP address is like the unique string of numbers that distinguishes your home on the global network, much like a postal worker needs your address to deliver a letter.&lt;/p&gt;

&lt;p&gt;Private IP Addresses: The people in your home&lt;br&gt;
  Within your house, each person (or device) might have their own room, represented by a private IP address. These private IPs allow the devices inside your network to communicate with each other and the broader internet securely.&lt;/p&gt;

&lt;p&gt;Ports: Your Doors&lt;br&gt;
  A house typically has doors with locks to control who can enter or exit. In the digital world, firewalls serve as these locks. Doors in your house, like the front door, garage door, or back door, are akin to ports on a computer network. Ports facilitate communication between your computer and the outside world. Each port is a different entry point through which data can enter or leave your system. &lt;/p&gt;

&lt;p&gt;Firewalls: Your Locks&lt;br&gt;
  Just as you wouldn’t leave all your doors unlocked, you shouldn't leave all ports open. Firewalls manage these ports, allowing communication through necessary ones while keeping others closed to prevent unauthorized access. A firewall acts as a barrier between your computer (or network) and potential threats from the internet, much like a lock on your front door keeps out intruders. It monitors incoming and outgoing traffic, deciding what should be allowed in or out based on a set of security rules.&lt;/p&gt;

&lt;p&gt;Antivirus Software: Your Security System&lt;br&gt;
  Many homes have security systems with alarms to detect and deter intruders. Similarly, antivirus software protects your computer by detecting, quarantining, and removing malicious software (malware). Malware can include viruses, spyware, ransomware, and more. Regular updates to your antivirus software ensure it can recognize and combat the latest threats.&lt;/p&gt;

&lt;p&gt;Encryption: Your Secret Code&lt;br&gt;
  Imagine you want to send a valuable package, but you don’t want anyone to tamper with it during transit. You might use a secure lock that only the recipient can open. In the digital world, encryption serves this purpose. It converts your data into a code that only authorized parties can decipher, ensuring that even if the data is intercepted, it cannot be read without the decryption key.&lt;/p&gt;

&lt;p&gt;VPNs: Your Private Tunnel&lt;br&gt;
  When you need to travel through the city unnoticed, you might use a private tunnel that hides your movements. A Virtual Private Network (VPN) works similarly by creating a secure, encrypted connection between your device and the internet. This makes it difficult for anyone to track your online activities or steal your data, especially when using public Wi-Fi networks.&lt;/p&gt;

&lt;p&gt;Two-Factor Authentication: Your Double-Lock System&lt;br&gt;
  Sometimes, a single lock isn’t enough to secure your home. You might use a second lock for added security. Two-factor authentication (2FA) adds an extra layer of protection to your online accounts. Even if someone cracks your password, they would still need the second piece of information, like a code sent to your phone, to gain access.&lt;/p&gt;

&lt;p&gt;Regular Updates: Your Maintenance Routine&lt;br&gt;
  Keeping your home in good repair prevents vulnerabilities like broken windows or doors. Similarly, regularly updating your software and systems is crucial in cybersecurity. Updates often include patches for security flaws that could be exploited by hackers. By keeping your systems updated, you ensure that your digital defenses remain strong.&lt;/p&gt;

&lt;p&gt;Conclusion&lt;br&gt;
  Just as maintaining the security of your home requires vigilance and good practices, so does protecting your digital life. Understanding the basics of IP addresses, firewalls, ports, passwords, antivirus software, encryption, VPNs, two-factor authentication, and regular updates will help you create a robust cybersecurity strategy. Remember, in the digital city, staying secure is an ongoing effort that keeps your data and personal information safe from cyber threats.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
