<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Hills Nfor</title>
    <description>The latest articles on DEV Community by Hills Nfor (@hills).</description>
    <link>https://dev.to/hills</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3401460%2Fb5c03bae-1a1c-4782-9d5e-6e937ef2663c.png</url>
      <title>DEV Community: Hills Nfor</title>
      <link>https://dev.to/hills</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/hills"/>
    <language>en</language>
    <item>
      <title>Hands-on OverTheWire Bandit - Day 1 Progress</title>
      <dc:creator>Hills Nfor</dc:creator>
      <pubDate>Sun, 10 Aug 2025 03:33:05 +0000</pubDate>
      <link>https://dev.to/hills/hands-on-overthewire-bandit-day-1-progress-4k7d</link>
      <guid>https://dev.to/hills/hands-on-overthewire-bandit-day-1-progress-4k7d</guid>
      <description>&lt;p&gt;&lt;strong&gt;Levels Completed:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Bandit Level 1&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Bandit Level 2&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&lt;br&gt;
I successfully completed the first two levels of the Bandit wargame on OverTheWire today. The tasks were challenging but rewarding, helping me strengthen my Linux command line and SSH skills.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Details:&lt;/strong&gt;&lt;br&gt;
Level 1: Connected to the server via SSH using the provided username. The main goal was to find the password for the next level, which was stored in a file named readme located in the home directory.&lt;/p&gt;

&lt;p&gt;Level 2: After logging in, I needed to find and read the contents of a hidden file in the home directory to retrieve the password for the next level. This challenged my knowledge of Linux commands to list hidden files and view their contents.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Commands Used:&lt;/strong&gt;&lt;br&gt;
ssh &lt;a href="mailto:bandit1@bandit.labs.overthewire.org"&gt;bandit1@bandit.labs.overthewire.org&lt;/a&gt; -p 2220&lt;br&gt;
Note: The -p option was necessary to specify the non-default SSH port after some research, as this was not initially provided in the instructions.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;ls -l&lt;br&gt;
ls -a&lt;br&gt;
cat readme&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My views:&lt;/strong&gt;&lt;br&gt;
The first level was straightforward, but level 2 required me to think about hidden files and how to reveal them. The discovery of the need to specify the SSH port was a key learning moment and emphasized the importance of research and troubleshooting. Overall, the experience helped improve my command line navigation and problem-solving skills. I’m motivated to continue and tackle more challenging levels subsequently. Follow for more &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>web3</category>
      <category>webdev</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Cybersecurity Learning Journey: Reposting with Clarity</title>
      <dc:creator>Hills Nfor</dc:creator>
      <pubDate>Sat, 09 Aug 2025 04:01:04 +0000</pubDate>
      <link>https://dev.to/hills/cybersecurity-learning-journey-reposting-with-clarity-50nc</link>
      <guid>https://dev.to/hills/cybersecurity-learning-journey-reposting-with-clarity-50nc</guid>
      <description>&lt;p&gt;Over the pass few weeks, I have been fully immersed in self learning Cybersecurity and documenting everything I learned daily and sharing it publicly.&lt;br&gt;
But here's is the truth - somewhere along the line, I realize that basics were a crucial part of the journey. I needed some understanding of the basics of Kali Linux under the distribution of Debian and communication(Basics of Networking) not just notes but getting the basic global norms was a necessity.&lt;/p&gt;

&lt;p&gt;I took a short break from posting because I needed to strategized the approach before sharing again. &lt;br&gt;
Now, I'm am glad to start reposting and sharing with you my journey once again armed with clearer direction and better tools, guys you won't believe this tool am about to shear with you..  I was shocked damnnn...&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What changed?&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Books I'm using&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Linux basics for Hackers by OccupyTheWeb(OTW)&lt;/li&gt;
&lt;li&gt;Network basics for Hackers by OccupyTheWeb(OTW)&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;The books got robust foundation for every beginner- it's indeed helping me - I strongly recommend this books to every beginner.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Hands-on Practice&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As a beginner, theory alone isn't enough. &lt;br&gt;
I had to look for ways I could actually dirty my hands on the learning process just to stumble this mind blowing websites &lt;em&gt;&lt;a href="https://overthewire.org" rel="noopener noreferrer"&gt;overthewire&lt;/a&gt;&lt;/em&gt; practical challenges and at the same time understanding SSH filesystems and real-world server scenarios is a game changer for beginners. OverTheWire has done a grate job putting this out there to aid cybersecurity learners &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Leveraging AI with a Special tool&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let me begin with this- Kudos to Google team for this genius study AI aid Model. &lt;br&gt;
Guys go check it out- this Gems helped me organized and query my notes like a super-smart study buddy enhancing my learning experience in less then no time leaving no stone unturn. If you find lengthy books tiring to read you want to turn the book into a podcast and also partake Google's NotebookLM is mind blowing- words can't explain go to &lt;em&gt;&lt;a href="https://notebooklm.com" rel="noopener noreferrer"&gt;notebooklm&lt;/a&gt;&lt;/em&gt; and don't forget to come back and share with me your experience at the comment section&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Why I'm Sharing Again?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Public writing helps me stay accountable and track progress while connecting with a community of learners and experts. I'm balancing deep study, hands-on practice, and consistent sharing because magic happens within resulting to growth. &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What to Expect Next&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Regular updates on my learning progress&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Summaries and insights from the books or any tools am working with&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Possible tips and resources for fellow learners&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you are also on the cybersecurity[Red Team],[Blue team],[SOC Analyst], or any related domain, lets connect and grow together...&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>networking</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Offensive security - Testing for Broken Access Control (OWASP)</title>
      <dc:creator>Hills Nfor</dc:creator>
      <pubDate>Mon, 04 Aug 2025 02:30:04 +0000</pubDate>
      <link>https://dev.to/hills/offensive-security-testing-for-broken-access-control-owasp-4llg</link>
      <guid>https://dev.to/hills/offensive-security-testing-for-broken-access-control-owasp-4llg</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;Hands-on at tryhackme room #1..&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;I used &lt;em&gt;dirb&lt;/em&gt; on CLI to brute-force hidden directories on a static web app&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;dirb http://www.targetwebsite.com/&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Findings:&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;I access the site like a normal user&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Discovered/admin/endpoints not shown in UI&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Lesson: Obscurity is not equal security&lt;/p&gt;

&lt;p&gt;Always enforce rule base control when building your website&lt;/p&gt;

&lt;p&gt;Day #3/50 journey...&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>beginners</category>
      <category>owasp</category>
    </item>
    <item>
      <title>Network Basics for Security</title>
      <dc:creator>Hills Nfor</dc:creator>
      <pubDate>Sat, 02 Aug 2025 00:57:25 +0000</pubDate>
      <link>https://dev.to/hills/network-basics-for-security-g1c</link>
      <guid>https://dev.to/hills/network-basics-for-security-g1c</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;TCP/IP&lt;/strong&gt; &lt;em&gt;and&lt;/em&gt; &lt;strong&gt;OSI Model&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The TCP/IP is the most used and accepted model and not own by an institution whereas the OSI model who more a theory and less accepted globally so for that reasons I will be basing our findings on TCP/IP model. &lt;br&gt;
It is basically the collection of layered network protocols that manages the communication of a network. It is made up of four(4) layers namely:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Application layer:&lt;/strong&gt; This layer is the bridge between the client(browser) and the lower layers of the network that sends the data.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Transport layer:&lt;/strong&gt; This layer is responsible for ensuring that data sent is arrived in it orderly manner as intended by the sender.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Internet layer:&lt;/strong&gt; This layer's duty is to find the best and fastest route data should be send on the network.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Data Link Layer:&lt;/strong&gt; This layer deals with the physical connection of devices with your computers that is there might be wired(Cable) or wireless(WiFi, Bluetooth). Ensuring data can be send from one device to another.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Day 2/50 of my Journey...&lt;/p&gt;

&lt;p&gt;Chao!&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>security</category>
      <category>cybersecurity</category>
      <category>tcp</category>
    </item>
    <item>
      <title>Day 1/50 Basics on cyber security &amp; web2</title>
      <dc:creator>Hills Nfor</dc:creator>
      <pubDate>Fri, 01 Aug 2025 00:45:03 +0000</pubDate>
      <link>https://dev.to/hills/day-150-basics-on-cyber-security-web2-1fop</link>
      <guid>https://dev.to/hills/day-150-basics-on-cyber-security-web2-1fop</guid>
      <description>&lt;h2&gt;
  
  
  What is cybersecurity?
&lt;/h2&gt;

&lt;p&gt;These are practical techniques that helps in securing unauthorized access to computer systems and personal digital data.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is CAI Triad?
&lt;/h2&gt;

&lt;p&gt;The Triad is the core of every system which is grounded on three powerful principles...&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Confidentiality:&lt;/strong&gt; Every system should be take full responsibility on all data and ensuring that only the rightful owner got accesses to their data.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Integrity:&lt;/strong&gt; All data should stay true as intended by the beholder, and if altered the by a third party, the system should be able detect and be notified.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Availability:&lt;/strong&gt; The system should be able to grants authorized user accesses to the resource they need when they need them.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Client Server Model
&lt;/h2&gt;

&lt;p&gt;Communication between the &lt;strong&gt;Client(Browser)&lt;/strong&gt; and the &lt;strong&gt;Server(Remote Computer)&lt;/strong&gt;&lt;br&gt;
Some vital things a notice here was &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;URL(Uniform Resource Locator)&lt;/strong&gt;: i.e. the human readable address e.g. &lt;a href="http://www.hillspere.com" rel="noopener noreferrer"&gt;www.hillspere.com&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;DNS(Domain Name Server)&lt;/strong&gt;: This DN Server is responsible for responding to the client request by sending the unique number (IP address)  pairing with the URL to the client.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;IP address&lt;/strong&gt; is a unique number that identifies a device on the internet.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  HTTP/HTTPS Basics
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;HTTP/HTTPS:&lt;/strong&gt; For the client and the server to communicate, a protocol is used, the client sends a request called HTTP(HyperText Transfer Protocol) or the HTTPS(the secured version) request to the IP address of the server to fetch anything from the server.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;h2&gt;
  
  
  Some hands-on practical on a webpage using the browsers developers tool (Network tab)
&lt;/h2&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;bfCache (Back Forward Cache):&lt;/strong&gt; This is an inbuilt optimizer in chrome browsers that enhance webpage's response time by default though some practice can hinder its functionality which is when you set in the control headers &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Response Headers &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Request Headers&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Its was an awesome one on my Day 1 journey I have learnt a lot from the above summaries am open to corrections and constructive critics see you all tomorrow.&lt;/p&gt;

&lt;p&gt;Chao!!!&lt;/p&gt;

</description>
      <category>security</category>
      <category>webdev</category>
      <category>web3</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Starting My Web2 &amp; Web3 Security Journey as a novice</title>
      <dc:creator>Hills Nfor</dc:creator>
      <pubDate>Thu, 31 Jul 2025 01:14:25 +0000</pubDate>
      <link>https://dev.to/hills/starting-my-web2-web3-security-journey-as-a-novice-4kho</link>
      <guid>https://dev.to/hills/starting-my-web2-web3-security-journey-as-a-novice-4kho</guid>
      <description>&lt;p&gt;Hey Dev Big Brains,&lt;/p&gt;

&lt;p&gt;I’m super glad to start this journey into &lt;strong&gt;Web2 and Web3 security&lt;/strong&gt;. I don’t have a background in security just passionate and a strong will to learn and grow.&lt;/p&gt;

&lt;p&gt;I’ll be sharing everything I learn, from the basics of Web2 security to the more complex stuff in Web3. This is mostly for &lt;strong&gt;educational purposes&lt;/strong&gt; and to raise &lt;strong&gt;awareness&lt;/strong&gt;, especially for beginners like me.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why I'm Doing This
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;I want to understand how Web2 &amp;amp; Web3 security works
&lt;/li&gt;
&lt;li&gt;I want to teach while learning
&lt;/li&gt;
&lt;li&gt;I want to help others avoid common security mistakes
&lt;/li&gt;
&lt;li&gt;I believe we all start somewhere and this is my “somewhere”&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How I'm Doing It
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;I ran a prompt on ChatGPT and got a &lt;strong&gt;50-day plan&lt;/strong&gt; to follow
&lt;/li&gt;
&lt;li&gt;I’ll be posting what I learn each day (or every few days)
&lt;/li&gt;
&lt;li&gt;It’ll be &lt;strong&gt;hands-on&lt;/strong&gt; and &lt;strong&gt;real&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What to Expect
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Simple explanations
&lt;/li&gt;
&lt;li&gt;My thoughts and mistakes
&lt;/li&gt;
&lt;li&gt;Real examples if any &lt;/li&gt;
&lt;li&gt;Your feedback, corrections, and advice are welcome!&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is my first post. Thanks for reading and feel free to follow along as I share more!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Let’s learn security together. One day at a time.&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>web3</category>
      <category>cybersecurity</category>
      <category>explainlikeimfive</category>
    </item>
  </channel>
</rss>
