<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mohammad Shams</title>
    <description>The latest articles on DEV Community by Mohammad Shams (@smdevlog).</description>
    <link>https://dev.to/smdevlog</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3291557%2F340d1e51-eadd-4dd4-9726-387fff2a9687.jpg</url>
      <title>DEV Community: Mohammad Shams</title>
      <link>https://dev.to/smdevlog</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/smdevlog"/>
    <language>en</language>
    <item>
      <title>I Built an Android App to Audit Third-Party Permissions — Here's What I Found</title>
      <dc:creator>Mohammad Shams</dc:creator>
      <pubDate>Tue, 01 Jul 2025 16:50:05 +0000</pubDate>
      <link>https://dev.to/smdevlog/i-built-an-android-app-to-audit-third-party-permissions-heres-what-i-found-1l4d</link>
      <guid>https://dev.to/smdevlog/i-built-an-android-app-to-audit-third-party-permissions-heres-what-i-found-1l4d</guid>
      <description>&lt;p&gt;Hey everyone 👋&lt;/p&gt;

&lt;p&gt;As part of my personal shift from Android development into cybersecurity, I wanted to better understand how apps handle user privacy — especially when it comes to &lt;strong&gt;granted permissions&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;So, I built a simple Android tool that scans installed third-party apps and displays which permissions they’ve actually been granted.&lt;/p&gt;




&lt;h3&gt;
  
  
  🔍 What the App Does
&lt;/h3&gt;

&lt;p&gt;This app:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Lists &lt;strong&gt;only third-party apps&lt;/strong&gt; (no system clutter)&lt;/li&gt;
&lt;li&gt;Shows &lt;strong&gt;granted permissions only&lt;/strong&gt; — not requested&lt;/li&gt;
&lt;li&gt;Categorizes apps based on access types (Camera, Location, etc.)&lt;/li&gt;
&lt;li&gt;Has a built-in search barr to quickly find suspicious apps&lt;/li&gt;
&lt;li&gt;Uses &lt;strong&gt;Material Design&lt;/strong&gt; with a clean UI&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  📱 Why I Built It
&lt;/h3&gt;

&lt;p&gt;I was surprised by how many apps quietly hold permissions I forgot I gave them — especially older ones I rarely open.&lt;/p&gt;

&lt;p&gt;Some apps had:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Full access to contacts ☎️&lt;/li&gt;
&lt;li&gt;Camera permission without photo features 📷&lt;/li&gt;
&lt;li&gt;Location access while never showing a map 🧭&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That felt… wrong.&lt;/p&gt;

&lt;p&gt;So this tool was my way to expplore how &lt;strong&gt;user-granted permissions&lt;/strong&gt; really work in practice — and how little visibility Android gives you out of the box.&lt;/p&gt;




&lt;h3&gt;
  
  
  🛠️ Tech Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Java + Android SDK (no external libs)&lt;/li&gt;
&lt;li&gt;PackageManager API&lt;/li&gt;
&lt;li&gt;RecyclerView with live filtering&lt;/li&gt;
&lt;li&gt;Target SDK 33 (privacy-safe, modern)&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  🔗 GitHub Repo:
&lt;/h3&gt;

&lt;p&gt;👉 &lt;a href="https://github.com/ShamsCyber/AndroidPermissionWatcher" rel="noopener noreferrer"&gt;Check out the code here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Feel free to fork, test, or suggest improvements!&lt;/p&gt;




&lt;h3&gt;
  
  
  🤔 What I Learned
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Android permission handling is more fragmented than I thought&lt;/li&gt;
&lt;li&gt;Some “granted” permissions are inherited silently from package updates&lt;/li&gt;
&lt;li&gt;Categorizing apps by permision type actually helps understand risk&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  🙌 Final Thoughts
&lt;/h3&gt;

&lt;p&gt;This was my way of applying old Android skills to a new path in &lt;strong&gt;mobile privacy and scurity&lt;/strong&gt;. If you're curious about app behavior or want to audit your own phone, this might be a fun project to try or contribute to.&lt;/p&gt;

&lt;p&gt;If you have suggestions (or want to break it 😅), let me know!&lt;/p&gt;

&lt;p&gt;Cheers,&lt;br&gt;&lt;br&gt;
Mohammad&lt;/p&gt;

</description>
      <category>android</category>
      <category>cybersecurity</category>
      <category>privacy</category>
      <category>mobile</category>
    </item>
    <item>
      <title>I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process 😅)</title>
      <dc:creator>Mohammad Shams</dc:creator>
      <pubDate>Sun, 29 Jun 2025 05:28:00 +0000</pubDate>
      <link>https://dev.to/smdevlog/i-built-a-simple-sql-injection-test-tool-and-broke-my-own-site-in-the-process--919</link>
      <guid>https://dev.to/smdevlog/i-built-a-simple-sql-injection-test-tool-and-broke-my-own-site-in-the-process--919</guid>
      <description>&lt;p&gt;Hey folks 👋&lt;/p&gt;

&lt;p&gt;As part of my self-learning journey into cybersecurity, I wanted to better understand &lt;strong&gt;SQL injection&lt;/strong&gt; — not just by reading, but by testing. So I built a small command-line tool to help simulate and detect potential SQLi patterns in GET parameters.&lt;/p&gt;




&lt;h3&gt;
  
  
  🛠️ The Tool
&lt;/h3&gt;

&lt;p&gt;It’s nothing fancy — just a simple PHP script that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Takes a URL with query parameters&lt;/li&gt;
&lt;li&gt;Injects common SQLi payloads (like &lt;code&gt;' OR 1=1 --&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;Sends requests and checks for keyword-based anomalies in responses&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;🔗 GitHub repo: &lt;a href="https://github.com/ShamsCyber/SQL-Injection-Bypass-Dork" rel="noopener noreferrer"&gt;SQL Injection Tester&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  🤯 What I Broke (and Fixed)
&lt;/h3&gt;

&lt;p&gt;At one point, I tested this against a test WordPress site I set up... and accidentally messed with a plugin’s query.&lt;br&gt;&lt;br&gt;
Nothing crashed, but I got a good scare. Lesson learned: always test safely 😅&lt;/p&gt;




&lt;h3&gt;
  
  
  🧠 What I Learned
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The difference between reflective vs blind injection&lt;/li&gt;
&lt;li&gt;How servers react differently to invalid queries&lt;/li&gt;
&lt;li&gt;Why pattern matching alone isn't enough for real detection&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  📌 What’s Next?
&lt;/h3&gt;

&lt;p&gt;I’m thinking of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Adding POST support&lt;/li&gt;
&lt;li&gt;Highlighting response diffs&lt;/li&gt;
&lt;li&gt;Maybe integrating with Burp logs later?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re learning security too, check it out. It’s raw and beginner-level, but I’m proud of it!&lt;/p&gt;

&lt;p&gt;Cheers,&lt;br&gt;&lt;br&gt;
Mohammad&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>php</category>
      <category>websecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Trying Out PowerShell for Process Logging — Finally Something That Feels Like Real Scripting 😅</title>
      <dc:creator>Mohammad Shams</dc:creator>
      <pubDate>Sat, 28 Jun 2025 07:11:00 +0000</pubDate>
      <link>https://dev.to/smdevlog/trying-out-powershell-for-process-logging-finally-something-that-feels-like-real-scripting-4f9</link>
      <guid>https://dev.to/smdevlog/trying-out-powershell-for-process-logging-finally-something-that-feels-like-real-scripting-4f9</guid>
      <description>&lt;p&gt;Hey Dev.to friends 👋&lt;/p&gt;

&lt;p&gt;After doing some basic process logging in Windows using a Batch file (and then exploring Task Manager + Sysinternals), I decided it was time to level up a bit and try... PowerShell.&lt;/p&gt;

&lt;p&gt;I’ll admit: at first, PowerShell felt like “Windows trying to be Linux.” But after writing my first sript? It started making sense. Sort of.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚙️ What I Wanted to Build
&lt;/h3&gt;

&lt;p&gt;A simple script that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Lists running processes&lt;/li&gt;
&lt;li&gt;Adds a timestamp&lt;/li&gt;
&lt;li&gt;Saves the info into a log file that I can revisit later&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  🧠 What I Wrote
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight powershell"&gt;&lt;code&gt;&lt;span class="nv"&gt;$date&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Get-Date&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Format&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"yyyy-MM-dd HH:mm:ss"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="s2"&gt;"--- &lt;/span&gt;&lt;span class="nv"&gt;$date&lt;/span&gt;&lt;span class="s2"&gt; ---"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Out-File&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Append&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;process_log.txt&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="n"&gt;Get-Process&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Sort-Object&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;CPU&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Descending&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Out-File&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Append&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;process_log.txt&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="se"&gt;`n&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="n"&gt;Out-File&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nt"&gt;-Append&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nx"&gt;process_log.txt&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This logs all running processes sorted by CPU usage, with a timestamp, into a process_log.txt file. Prettiy clean, right?&lt;/p&gt;

&lt;h3&gt;
  
  
  🤔 What I Learned
&lt;/h3&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;PowerShell is actually kind of elegant once you get past the weird syntax

Out-File -Append is your best friend

Sorting and filtering are much easier than in Batch

Debugging PowerShell errors feels like reading Shakespeare sometimes 😅
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;h3&gt;
  
  
  🧪 Bonus Experiment
&lt;/h3&gt;

&lt;p&gt;I left the script running with Task Scheduler every 10 minutes and then compared the logs manually.&lt;/p&gt;

&lt;p&gt;I noticed some weird spikes in RuntimeBroker.exe and a random instance of wscript.exe I didn’t expect. Mighgt be nothing... or maybe the beginning of a rabbit hole 🐇&lt;br&gt;
🎯 What’s Next&lt;/p&gt;

&lt;p&gt;I want to:&lt;/p&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Add filters (only show user-initiated processes)

Log changes only (diff between snapshots)

Maybe try sending logs via email for remote monitoring?
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Still figuring things out, but this script was a big leap from the Batch stuff.&lt;/p&gt;

&lt;h3&gt;
  
  
  🙌 Final Thoughts
&lt;/h3&gt;

&lt;p&gt;If you're new to PowerShell like I was, don’t stress — just build small stuff. Forget the theory at first, just write something dumb that does one thing. Then make it smarter later.&lt;/p&gt;

&lt;p&gt;And if you know any cool tricks for process logging or filtering in PowerShell, I’d love to hear them!&lt;/p&gt;

&lt;p&gt;Cheers,&lt;br&gt;
Mohammad&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>powershell</category>
      <category>windows</category>
      <category>scripting</category>
    </item>
    <item>
      <title>My First Dive into Windows Process Analysis: Task Manager, Sysinternals &amp; Mild Confusion 😅</title>
      <dc:creator>Mohammad Shams</dc:creator>
      <pubDate>Fri, 27 Jun 2025 05:23:00 +0000</pubDate>
      <link>https://dev.to/smdevlog/my-first-dive-into-windows-process-analysis-task-manager-sysinternals-mild-confusion-3m17</link>
      <guid>https://dev.to/smdevlog/my-first-dive-into-windows-process-analysis-task-manager-sysinternals-mild-confusion-3m17</guid>
      <description>&lt;p&gt;Hey again 👋&lt;/p&gt;

&lt;p&gt;After playing with my tiny Batch script for logging Windows processes (see &lt;a href="https://dev.to/yourusername/my-first-attempt-at-writing-a-windows-process-logger-in-batch-1234"&gt;my last post&lt;/a&gt;), I wanted to see how the pros do it.&lt;/p&gt;

&lt;p&gt;So, &lt;strong&gt;I explored the native Task Manager&lt;/strong&gt;... and then fell into the rabbit hole of &lt;strong&gt;Sysinternals&lt;/strong&gt;.&lt;/p&gt;




&lt;h3&gt;
  
  
  🧪 What I tried:
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Task Manager&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
_   Good for quick views. But too friendly. I wanted more raw info._&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Process Explorer (from Sysinternals)&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
&lt;em&gt;And &lt;em&gt;this&lt;/em&gt; is where things got juicy.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;Realtime tree view? ✔️
&lt;/li&gt;
&lt;li&gt;Parent/child process chains? ✔️
&lt;/li&gt;
&lt;li&gt;Tons of columns I had no clue about? ✔️✔️✔️&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Process Monitor&lt;/strong&gt;
I don’t fully understand it yet, but watching file + registry access live? Felt like Wireshark but for the OS.&lt;/li&gt;
&lt;/ol&gt;




&lt;h3&gt;
  
  
  🤔 Key Moments:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;I killed a process and saw the tree adjust in real time. Felt like I was performiing &lt;em&gt;surgery on the OS&lt;/em&gt; 😄&lt;/li&gt;
&lt;li&gt;I learned about &lt;code&gt;svchost.exe&lt;/code&gt; — still not sure how many of them are “normal”&lt;/li&gt;
&lt;li&gt;I noticed Chrome runs like 20+ processes for reasons I still don’t get. Is it hungry or paranoid?&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyew4bd47a7j9shdop009.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyew4bd47a7j9shdop009.jpg" alt="Image description" width="500" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  💡 What I learned:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Tools matter. Even visuual ones like ProcExp can teach a lot.&lt;/li&gt;
&lt;li&gt;Observing is half the battle. The more I &lt;em&gt;watch&lt;/em&gt;, the more patterns I start to see.&lt;/li&gt;
&lt;li&gt;Security isn't always about breaking — sometimes it's about noticing.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  🧭 Next Plan:
&lt;/h3&gt;

&lt;p&gt;I’m thinking of combining my Batch logger with fltered data from Process Explorer (via CLI or logs?) — or maybe switching to PowerShell for more power and less pain 😅&lt;/p&gt;

&lt;p&gt;Any tips from folks who’ve worked with Windows internals are welcome!&lt;/p&gt;




&lt;p&gt;Thanks again for following this clunky but fun journey into cybersecurity from the ground up 🧠&lt;br&gt;&lt;br&gt;
– Mohammad&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>windows</category>
      <category>sysinternals</category>
      <category>devjournal</category>
    </item>
    <item>
      <title>My First Attempt at Writing a Windows Process Logger in Batch (Yes, It’s Ugly, but It Works)</title>
      <dc:creator>Mohammad Shams</dc:creator>
      <pubDate>Thu, 26 Jun 2025 04:24:00 +0000</pubDate>
      <link>https://dev.to/smdevlog/my-first-attempt-at-writing-a-windows-process-logger-in-batch-yes-its-ugly-but-it-works-34nh</link>
      <guid>https://dev.to/smdevlog/my-first-attempt-at-writing-a-windows-process-logger-in-batch-yes-its-ugly-but-it-works-34nh</guid>
      <description>&lt;p&gt;Hey folks 👋&lt;/p&gt;

&lt;p&gt;As promised in my first post, I’m learning cybersecurity by building small, real-world tools — even if they’re weird, ugly, or incomplete.&lt;/p&gt;

&lt;p&gt;This time I decided to tackle something basic but useful: logging running processes in Windows usng a plain old &lt;code&gt;.bat&lt;/code&gt; script. Why Batch? Because I wanted to start from zero, from the most available thing on any machine.&lt;/p&gt;




&lt;h3&gt;
  
  
  🎯 The Goal
&lt;/h3&gt;

&lt;p&gt;Create a script that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Lists all active processes&lt;/li&gt;
&lt;li&gt;Logs them into a &lt;code&gt;.txt&lt;/code&gt; file with a timestamp&lt;/li&gt;
&lt;li&gt;Appends, not replaces, data (to monitor changes over time)&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  ⚙️ The Code (bare bones version)
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight batchfile"&gt;&lt;code&gt;@echo &lt;span class="na"&gt;off&lt;/span&gt;
&lt;span class="kd"&gt;set&lt;/span&gt; &lt;span class="s2"&gt;"logfile=process_log.txt"&lt;/span&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="o"&gt;----&lt;/span&gt; &lt;span class="nv"&gt;%date%&lt;/span&gt; &lt;span class="nv"&gt;%time%&lt;/span&gt; &lt;span class="o"&gt;----&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&amp;gt;&lt;/span&gt; &lt;span class="nv"&gt;%logfile%&lt;/span&gt;
&lt;span class="nb"&gt;tasklist&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&amp;gt;&lt;/span&gt; &lt;span class="nv"&gt;%logfile%&lt;/span&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt;. &lt;span class="o"&gt;&amp;gt;&amp;gt;&lt;/span&gt; &lt;span class="nv"&gt;%logfile%&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Yep. That’s it.&lt;/p&gt;

&lt;p&gt;It took me a lot more time than I’m willing to admit to understand how &amp;gt;&amp;gt; really works vs &amp;gt;, but hey — that’s part of the learning curve. 😅&lt;br&gt;
🤔 Why This Matters (for me at least)&lt;/p&gt;

&lt;p&gt;In Android or backend work, you usually have libraries or services doing this kind of monetoring. But in cybersecurity, you’re often the one building the tool from scratch — even if it’s just to test a theory.&lt;/p&gt;

&lt;p&gt;This script helped me understand:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Basic I/O in CMD

How malware might hide or fake processes

Why log integrity is such a huge deal
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;I even manually killed and restarted some processes just to see how things change across logs — nothing fancy, but it gave me ideas.&lt;br&gt;
📌 Next Steps&lt;/p&gt;

&lt;p&gt;Here’s what I’m planning to add next:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Filter out system processes

Log new processes only (maybe with PowerShell?)

Send alerts (even if just a beep for now 😄)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;🧪 What I Learned&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Even small scripts can teach you a lot

Debugging in CMD is... a unique experience 😅

I should’ve learned about findstr sooner
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;🙌 Final Thoughts&lt;/p&gt;

&lt;p&gt;If you’re also learning cybersecurity from scratch, don’t be afraid to build basic stuff. Forget funcy UIs or frameworks — just solve a tiny problem and move on.&lt;/p&gt;

&lt;p&gt;I’ll keep sharing small tools like this as I go, and I’d love to hear what kind of beginner-friendly ideas you’ve tried too.&lt;/p&gt;

&lt;p&gt;Thanks for reading,&lt;br&gt;
Mohammad 🧠&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>bash</category>
      <category>devjournal</category>
      <category>batch</category>
    </item>
    <item>
      <title>From Android Developer to Cybersecurity Beginner: A Public Journey, Not a Hero Story</title>
      <dc:creator>Mohammad Shams</dc:creator>
      <pubDate>Wed, 25 Jun 2025 05:03:17 +0000</pubDate>
      <link>https://dev.to/smdevlog/from-android-developer-to-cybersecurity-beginner-a-public-journey-not-a-hero-story-clh</link>
      <guid>https://dev.to/smdevlog/from-android-developer-to-cybersecurity-beginner-a-public-journey-not-a-hero-story-clh</guid>
      <description>&lt;p&gt;👋 Hey there, fellow devs!&lt;/p&gt;

&lt;p&gt;So... I'm one of those developers who spent &lt;em&gt;years&lt;/em&gt; in Android and backend development (mostly Java/Kotlin, PHP, WordPress). And now — surprise — I’m walking straight into cybersecurity. 🎯&lt;/p&gt;

&lt;p&gt;No, it’s not because of a hack in a Hollywood movie (though I &lt;em&gt;might&lt;/em&gt; have seen Mr. Robot more than twice 😅). It’s more like: I wanted a challenge again. Something deeper. Something that &lt;em&gt;feels&lt;/em&gt; closer to the system, and honestly? Something that makes me nervous in a good way.&lt;/p&gt;




&lt;h3&gt;
  
  
  💻 Where I’m coming from
&lt;/h3&gt;

&lt;p&gt;I've been coding professionally for 7–8 years, mainly working on Android apps, WordPress sites, and backend integrations. I’ve dealt with messy APIs, debugging nightmares, and way too many coffee-driven bug hunts.&lt;/p&gt;

&lt;p&gt;But one thing I’ve alwayss avoided? Security. I just assumed the tools “take care of it” — which now I know is a &lt;em&gt;terrible&lt;/em&gt; assumption. 😅&lt;/p&gt;




&lt;h3&gt;
  
  
  🔐 Where I’m heading
&lt;/h3&gt;

&lt;p&gt;A few months ago, I started reading up on basic infosec topics: Bash scripting, Linux permissions, vulnerabilities in WordPress (yeah, ironic), and even how malware hides in plain sight.&lt;/p&gt;

&lt;p&gt;I'm not here pretending to be an expert. I’m just trying to &lt;strong&gt;learn in public&lt;/strong&gt;, build tiny tools (even if they’re a bit ugly), and maybe help other devs who are also curious abuot security but don't know where to begin.&lt;/p&gt;




&lt;h3&gt;
  
  
  🛠️ What I'm doing now
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Rewriting my GitHub to show simple but real projects&lt;/li&gt;
&lt;li&gt;Publishing notes as I learn (even the dumb mistakes — I’ve made a few!)&lt;/li&gt;
&lt;li&gt;Writing here on Dev.to to track my journey and stay accountable&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I’m also building a few tools like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;a batch script that logs suspicious processes in Windows&lt;/li&gt;
&lt;li&gt;a basic log parser to track weird activity&lt;/li&gt;
&lt;li&gt;and my favorite so far: breaking my own WordPress installs just to see what happens 🧨&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  🤝 Let's connect
&lt;/h3&gt;

&lt;p&gt;If you're in the same boat — transitioning into security, doing self-study, or just into weird litle experiments — I'd love to connect.&lt;/p&gt;

&lt;p&gt;Also, if you’re a hiring manager or migration officer reading this (hey 👀), this is my honest attempt to share publicly what I’m learning as I go. This stuff is &lt;em&gt;not&lt;/em&gt; easy, but it’s exciting.&lt;/p&gt;

&lt;p&gt;Thanks for reading — I’ll post something real and code-y next time.&lt;/p&gt;

&lt;p&gt;Cheers,&lt;br&gt;&lt;br&gt;
Mohammad 👨‍💻&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devjournal</category>
      <category>bash</category>
      <category>linux</category>
    </item>
  </channel>
</rss>
