<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Soumya Khaskel</title>
    <description>The latest articles on DEV Community by Soumya Khaskel (@soumya_k19).</description>
    <link>https://dev.to/soumya_k19</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3847081%2F4bc00dfc-e682-4c07-9def-2e80bb88950b.jpeg</url>
      <title>DEV Community: Soumya Khaskel</title>
      <link>https://dev.to/soumya_k19</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/soumya_k19"/>
    <language>en</language>
    <item>
      <title>TryHackMe - Fresher's guide to rule become top 20% easily.</title>
      <dc:creator>Soumya Khaskel</dc:creator>
      <pubDate>Wed, 08 Apr 2026 17:29:18 +0000</pubDate>
      <link>https://dev.to/soumya_k19/tryhackme-freshers-guide-to-rule-become-top-20-easily-2okk</link>
      <guid>https://dev.to/soumya_k19/tryhackme-freshers-guide-to-rule-become-top-20-easily-2okk</guid>
      <description>&lt;h1&gt;
  
  
  Confused Where to Start on TryHackMe? Here Are 30 Free Rooms — Sequenced for CEH Prep
&lt;/h1&gt;

&lt;p&gt;I've been preparing for the CEH exam (sitting May 2026) while working in SOC &lt;br&gt;
operations, and I noticed the same problem coming up constantly in every &lt;br&gt;
cybersecurity Discord and subreddit:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"I just signed up for TryHackMe. Where do I even start?"&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Most answers are vague. "Just do rooms." "Follow a path." Nobody maps it out &lt;br&gt;
clearly, tells you which rooms are actually free, or sequences them in a way &lt;br&gt;
that aligns to a specific goal like CEH.&lt;/p&gt;

&lt;p&gt;So I did it myself.&lt;/p&gt;




&lt;h2&gt;
  
  
  What This Guide Is
&lt;/h2&gt;

&lt;p&gt;A curated list of &lt;strong&gt;30 free TryHackMe rooms&lt;/strong&gt; across &lt;strong&gt;7 progressive phases&lt;/strong&gt; — &lt;br&gt;
every room mapped to a CEH domain, with a time estimate and direct URL.&lt;/p&gt;

&lt;p&gt;It's designed for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Students actively prepping for CEH v12&lt;/li&gt;
&lt;li&gt;CS / MCA / BCA students who want hands-on skills alongside theory&lt;/li&gt;
&lt;li&gt;Developers transitioning into cybersecurity (your web dev background = 
unfair advantage on the web hacking phases)&lt;/li&gt;
&lt;li&gt;Anyone who opened TryHackMe and had no idea where to click first&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Why TryHackMe for CEH Prep?
&lt;/h2&gt;

&lt;p&gt;The CEH exam tests 20 knowledge domains — footprinting, scanning, exploitation, &lt;br&gt;
web app hacking, cryptography, and more.&lt;/p&gt;

&lt;p&gt;Most candidates study theory but arrive at the exam having never:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Run a real Nmap scan against a live target&lt;/li&gt;
&lt;li&gt;Intercepted an HTTP request with Burp Suite&lt;/li&gt;
&lt;li&gt;Cracked a hash in a terminal&lt;/li&gt;
&lt;li&gt;Used Metasploit against an actual vulnerable machine&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;TryHackMe puts you inside a live vulnerable environment, guided by tasks &lt;br&gt;
that mirror exactly what CEH tests — in the order CEH tests them.&lt;/p&gt;




&lt;h2&gt;
  
  
  The 7-Phase Roadmap
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Phase 1 — Orientation &amp;amp; Setup &lt;em&gt;(~45 min)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;Get comfortable with the THM interface before diving in.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;Room&lt;/th&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;CEH Domain&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;01&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/tutorial" rel="noopener noreferrer"&gt;Tutorial&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;10 min&lt;/td&gt;
&lt;td&gt;Interface basics&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;02&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/startingoutincybersec" rel="noopener noreferrer"&gt;Starting Out in Cyber Sec&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;20 min&lt;/td&gt;
&lt;td&gt;CEH mindset&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;03&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/introtoresearch" rel="noopener noreferrer"&gt;Introductory Researching&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;30 min&lt;/td&gt;
&lt;td&gt;OSINT basics&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  Phase 2 — Linux &amp;amp; Networking Core &lt;em&gt;(~6 hr)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;Your Linux coursework helps here — but the attack context is completely &lt;br&gt;
different from academic learning. Do all 8 rooms.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;Room&lt;/th&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;CEH Domain&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;04&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/linuxfundamentalspart1" rel="noopener noreferrer"&gt;Linux Fundamentals Part 1&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1 hr&lt;/td&gt;
&lt;td&gt;System Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;05&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/linuxfundamentalspart2" rel="noopener noreferrer"&gt;Linux Fundamentals Part 2&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1 hr&lt;/td&gt;
&lt;td&gt;System Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;06&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/linuxfundamentalspart3" rel="noopener noreferrer"&gt;Linux Fundamentals Part 3&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1 hr&lt;/td&gt;
&lt;td&gt;System Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;07&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/whatisnetworking" rel="noopener noreferrer"&gt;What is Networking?&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;45 min&lt;/td&gt;
&lt;td&gt;Footprinting&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;08&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/introtolan" rel="noopener noreferrer"&gt;Intro to LAN&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;45 min&lt;/td&gt;
&lt;td&gt;Footprinting&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/osimodelzi" rel="noopener noreferrer"&gt;OSI Model&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;30 min&lt;/td&gt;
&lt;td&gt;Sniffing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/dnsindetail" rel="noopener noreferrer"&gt;DNS in Detail&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;45 min&lt;/td&gt;
&lt;td&gt;Footprinting&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/httpindetail" rel="noopener noreferrer"&gt;HTTP in Detail&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;45 min&lt;/td&gt;
&lt;td&gt;Web App Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  Phase 3 — Reconnaissance &amp;amp; Scanning &lt;em&gt;(~6 hr)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;CEH's biggest domains. &lt;strong&gt;Nmap alone accounts for 3–5 exam questions.&lt;/strong&gt; &lt;br&gt;
Do not rush these.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;Room&lt;/th&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;CEH Domain&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/furthernmap" rel="noopener noreferrer"&gt;Nmap&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;2 hr&lt;/td&gt;
&lt;td&gt;Scanning Networks&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/nmap01" rel="noopener noreferrer"&gt;Nmap Live Host Discovery&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1.5 hr&lt;/td&gt;
&lt;td&gt;Scanning&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/passiverecon" rel="noopener noreferrer"&gt;Passive Reconnaissance&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1 hr&lt;/td&gt;
&lt;td&gt;Footprinting&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/activerecon" rel="noopener noreferrer"&gt;Active Reconnaissance&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1 hr&lt;/td&gt;
&lt;td&gt;Footprinting&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/contentdiscovery" rel="noopener noreferrer"&gt;Content Discovery&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1.5 hr&lt;/td&gt;
&lt;td&gt;Web App Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  Phase 4 — Web Application Hacking &lt;em&gt;(~10 hr)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;If you have a dev background — React, Node, Django, Laravel, anything — &lt;br&gt;
you'll move faster here than 90% of people. You already understand &lt;br&gt;
request-response cycles, session handling, and how SQL queries get built. &lt;br&gt;
Now you exploit them.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;Room&lt;/th&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;CEH Domain&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/howwebsiteswork" rel="noopener noreferrer"&gt;How Websites Work&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;45 min&lt;/td&gt;
&lt;td&gt;Web App Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/owasptop102021" rel="noopener noreferrer"&gt;OWASP Top 10 — 2021&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;3–4 hr&lt;/td&gt;
&lt;td&gt;Web App Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/burpsuitebasics" rel="noopener noreferrer"&gt;Burp Suite: The Basics&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;2 hr&lt;/td&gt;
&lt;td&gt;Web App Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/sqlinjectionlm" rel="noopener noreferrer"&gt;SQL Injection&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;2 hr&lt;/td&gt;
&lt;td&gt;SQL Injection&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;21&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/axss" rel="noopener noreferrer"&gt;Cross-site Scripting&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1.5 hr&lt;/td&gt;
&lt;td&gt;Web App Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;22&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/fileinc" rel="noopener noreferrer"&gt;File Inclusion&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1.5 hr&lt;/td&gt;
&lt;td&gt;Web App Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;The OWASP Top 10 room is the crown jewel of this phase.&lt;/strong&gt; Each task is &lt;br&gt;
a separate OWASP category with a live lab. Don't rush it.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h3&gt;
  
  
  Phase 5 — Exploitation &amp;amp; Post-Exploitation &lt;em&gt;(~9.5 hr)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;Metasploit is &lt;strong&gt;explicitly tested&lt;/strong&gt; in CEH. This is not optional.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;Room&lt;/th&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;CEH Domain&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;23&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/metasploitintro" rel="noopener noreferrer"&gt;Metasploit: Introduction&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1.5 hr&lt;/td&gt;
&lt;td&gt;System Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/metasploitexploitation" rel="noopener noreferrer"&gt;Metasploit: Exploitation&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;2 hr&lt;/td&gt;
&lt;td&gt;System Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;25&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/meterpreter" rel="noopener noreferrer"&gt;Metasploit: Meterpreter&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1.5 hr&lt;/td&gt;
&lt;td&gt;System Hacking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;26&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/hydra" rel="noopener noreferrer"&gt;Hydra&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1 hr&lt;/td&gt;
&lt;td&gt;Password Cracking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;27&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/johntheripper0" rel="noopener noreferrer"&gt;John the Ripper&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1.5 hr&lt;/td&gt;
&lt;td&gt;Cryptography&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;28&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/encryptioncrypto101" rel="noopener noreferrer"&gt;Encryption — Crypto 101&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;2 hr&lt;/td&gt;
&lt;td&gt;Cryptography&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  Phase 6 — Beginner Practice Machines &lt;em&gt;(~9 hr)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;No guidance. Just you and the machine. &lt;strong&gt;Spend 30 minutes trying before &lt;br&gt;
you look at any walkthrough&lt;/strong&gt; — the stuck feeling is where learning &lt;br&gt;
actually happens.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;Room&lt;/th&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;29&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/picklerick" rel="noopener noreferrer"&gt;Pickle Rick&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1–2 hr&lt;/td&gt;
&lt;td&gt;Web + Linux CTF&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;30&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/basicpentestingjt" rel="noopener noreferrer"&gt;Basic Pentesting&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;2 hr&lt;/td&gt;
&lt;td&gt;Full pentest cycle&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;31&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/ignite" rel="noopener noreferrer"&gt;Ignite&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1.5 hr&lt;/td&gt;
&lt;td&gt;CMS exploit + privesc&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;32&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/cowboyhacker" rel="noopener noreferrer"&gt;Bounty Hacker&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;1.5 hr&lt;/td&gt;
&lt;td&gt;FTP → SSH → privesc&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;33&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/rrootme" rel="noopener noreferrer"&gt;RootMe&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;2 hr&lt;/td&gt;
&lt;td&gt;File upload + SUID&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  Phase 7 — Intermediate Machines &lt;em&gt;(post-CEH territory)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;These expect you to enumerate independently and research on your own. &lt;br&gt;
This is where HTB-level skills start building.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;Room&lt;/th&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;Domain&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;34&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/blue" rel="noopener noreferrer"&gt;Blue&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;2–3 hr&lt;/td&gt;
&lt;td&gt;EternalBlue (MS17-010)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;35&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/ice" rel="noopener noreferrer"&gt;Ice&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;2–3 hr&lt;/td&gt;
&lt;td&gt;Icecast exploit → Meterpreter&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;36&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/crackthehash" rel="noopener noreferrer"&gt;Crack the Hash&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;2 hr&lt;/td&gt;
&lt;td&gt;Multi-format hash cracking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;37&lt;/td&gt;
&lt;td&gt;&lt;a href="https://tryhackme.com/room/adventofcyber4" rel="noopener noreferrer"&gt;Advent of Cyber (Archive)&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Ongoing&lt;/td&gt;
&lt;td&gt;All CEH domains&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Advent of Cyber archives are free year-round.&lt;/strong&gt; 25 challenges covering &lt;br&gt;
every domain. The best free structured content THM offers.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Realistic Timeline
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Phases&lt;/th&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;Daily Commitment&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Phases 1–3&lt;/td&gt;
&lt;td&gt;~2 weeks&lt;/td&gt;
&lt;td&gt;1 hr/day&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Phases 4–5&lt;/td&gt;
&lt;td&gt;~2 weeks&lt;/td&gt;
&lt;td&gt;1 hr/day&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Phases 6–7&lt;/td&gt;
&lt;td&gt;~2 weeks&lt;/td&gt;
&lt;td&gt;Weekends&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Download the PDF Version
&lt;/h2&gt;

&lt;p&gt;I packaged this into a printable PDF with checkboxes beside every room — &lt;br&gt;
tick them off as you complete each one.&lt;/p&gt;

&lt;p&gt;[Download PDF → GitHub link here - &lt;a href="https://github.com/SoumyaKhaskel/TRY_HACK_ME" rel="noopener noreferrer"&gt;https://github.com/SoumyaKhaskel/TRY_HACK_ME&lt;/a&gt;]&lt;/p&gt;

&lt;h2&gt;
  
  
  One Last Thing
&lt;/h2&gt;

&lt;p&gt;The most common mistake I see: people complete rooms but don't document &lt;br&gt;
anything. Every room you finish, write two sentences about what you learned. &lt;br&gt;
Paste it into a Notion doc, a private GitHub repo, anywhere. Those notes &lt;br&gt;
become your interview answers six months from now.&lt;/p&gt;

&lt;p&gt;If this helped you, share it with someone else who's been staring at the &lt;br&gt;
THM homepage not knowing where to start.&lt;/p&gt;

&lt;p&gt;Good luck. The struggle is the lesson.&lt;/p&gt;

&lt;p&gt;— Soumya | &lt;a href="https://linkedin.com/in/khaskelsoumya" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt; | &lt;br&gt;
&lt;a href="https://github.com/SoumyaKhaskel" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt; | &lt;br&gt;
&lt;a href="https://tryhackme.com/p/soumyakhaskel21" rel="noopener noreferrer"&gt;THM Profile&lt;/a&gt;&lt;/p&gt;

</description>
      <category>tryhackme</category>
      <category>tutorial</category>
      <category>beginners</category>
      <category>security</category>
    </item>
    <item>
      <title>I Built an AI Cybersecurity Agent for $0 — And It Runs 24/7</title>
      <dc:creator>Soumya Khaskel</dc:creator>
      <pubDate>Sun, 05 Apr 2026 05:39:40 +0000</pubDate>
      <link>https://dev.to/soumya_k19/i-built-an-ai-cybersecurity-agent-for-0-and-it-runs-247-43om</link>
      <guid>https://dev.to/soumya_k19/i-built-an-ai-cybersecurity-agent-for-0-and-it-runs-247-43om</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fitx638am9gyihk7rsyh5.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fitx638am9gyihk7rsyh5.jpeg" alt=" " width="800" height="455"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  I Built an AI Cybersecurity Agent for $0 — And It Runs 24/7
&lt;/h1&gt;

&lt;p&gt;Most people “learn cybersecurity” by reading.&lt;/p&gt;

&lt;p&gt;I built something that &lt;em&gt;does it live&lt;/em&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🚀 The Idea
&lt;/h2&gt;

&lt;p&gt;I wanted a system that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Tracks real-world cyber threats continuously&lt;/li&gt;
&lt;li&gt;Filters noise&lt;/li&gt;
&lt;li&gt;Alerts me instantly when something critical happens&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So I built an &lt;strong&gt;AI-powered cybersecurity agent&lt;/strong&gt; that runs every 30 minutes and sends alerts directly to my phone.&lt;/p&gt;




&lt;h2&gt;
  
  
  ⚙️ What It Does
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Fetches cybersecurity news from:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CISA&lt;/li&gt;
&lt;li&gt;The Hacker News&lt;/li&gt;
&lt;li&gt;Krebs on Security&lt;/li&gt;
&lt;li&gt;BleepingComputer&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;Processes each article using:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Groq + Llama 3.1&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;Generates:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;2-line plain-English summary&lt;/li&gt;
&lt;li&gt;Severity classification → Critical / High / Medium / Low&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;Sends:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🚨 &lt;strong&gt;Telegram alert for Critical threats&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧩 System Architecture
&lt;/h2&gt;

&lt;p&gt;This isn’t a chatbot. It’s a &lt;strong&gt;real pipeline&lt;/strong&gt;:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Fetch → RSS sources&lt;/li&gt;
&lt;li&gt;Deduplicate → SHA-256 hashing&lt;/li&gt;
&lt;li&gt;AI Tagging → Summary + severity&lt;/li&gt;
&lt;li&gt;Store → SQLite&lt;/li&gt;
&lt;li&gt;Serve → FastAPI&lt;/li&gt;
&lt;li&gt;Display → Dashboard&lt;/li&gt;
&lt;li&gt;Alert → Telegram&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As shown in the architecture diagram (&lt;em&gt;page 4 of documentation&lt;/em&gt;), each stage is isolated and independently replaceable. &lt;/p&gt;




&lt;h2&gt;
  
  
  🧱 Tech Stack (100% Free)
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Backend → FastAPI&lt;/li&gt;
&lt;li&gt;AI → Groq (Llama 3.1)&lt;/li&gt;
&lt;li&gt;Scheduler → APScheduler&lt;/li&gt;
&lt;li&gt;Database → SQLite&lt;/li&gt;
&lt;li&gt;Hosting → Railway&lt;/li&gt;
&lt;li&gt;Frontend → Vercel&lt;/li&gt;
&lt;li&gt;Alerts → Telegram Bot&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;💡 Total cost: &lt;strong&gt;$0&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🔥 Key Engineering Decisions
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Deduplication
&lt;/h3&gt;

&lt;p&gt;Using SHA-256 URL hashing prevented ~60–70% duplicate processing (huge API savings).&lt;/p&gt;

&lt;h3&gt;
  
  
  Structured Prompting
&lt;/h3&gt;

&lt;p&gt;Instead of free text, the AI outputs strict JSON → easier parsing and reliability.&lt;/p&gt;

&lt;h3&gt;
  
  
  Alert Control
&lt;/h3&gt;

&lt;p&gt;&lt;code&gt;alerted=1&lt;/code&gt; flag ensures &lt;strong&gt;no duplicate notifications&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  📊 What Makes This Valuable
&lt;/h2&gt;

&lt;p&gt;This project is not theoretical.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Every article = real threat intelligence&lt;/li&gt;
&lt;li&gt;Every CVE = real vulnerability&lt;/li&gt;
&lt;li&gt;Every alert = something worth investigating&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As described in the project outcomes (&lt;em&gt;page 13&lt;/em&gt;), this acts as a &lt;strong&gt;live threat intelligence database + learning system&lt;/strong&gt;. &lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 What I Learned
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Building real AI pipelines (not demos)&lt;/li&gt;
&lt;li&gt;Debugging deployment issues (CORS, Linux case sensitivity, Git conflicts)&lt;/li&gt;
&lt;li&gt;Designing scalable data flows&lt;/li&gt;
&lt;li&gt;That debugging teaches more than tutorials&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🔮 What’s Next
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;IOC extraction (CVE, IPs, domains)&lt;/li&gt;
&lt;li&gt;Personal threat watchlist&lt;/li&gt;
&lt;li&gt;Weekly AI threat digest&lt;/li&gt;
&lt;li&gt;Inline URL scanner&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;(&lt;em&gt;Planned improvements outlined on page 15&lt;/em&gt;) &lt;/p&gt;




&lt;h2&gt;
  
  
  🌐 Live Project
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Dashboard: &lt;a href="https://cybersec-news-agent.vercel.app/" rel="noopener noreferrer"&gt;https://cybersec-news-agent.vercel.app/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;GitHub:&lt;a href="https://github.com/SoumyaKhaskel/cybersec-news-agent" rel="noopener noreferrer"&gt;https://github.com/SoumyaKhaskel/cybersec-news-agent&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧭 Final Thought
&lt;/h2&gt;

&lt;p&gt;Reading builds knowledge.&lt;br&gt;
Building creates capability.&lt;/p&gt;

&lt;p&gt;If you're preparing for CEH or Security+, stop just consuming.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Build something that watches the real world.&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>webdev</category>
      <category>cybersecurity</category>
      <category>automation</category>
    </item>
    <item>
      <title>Network Optimization Guide (Gaming/Streaming)</title>
      <dc:creator>Soumya Khaskel</dc:creator>
      <pubDate>Sat, 28 Mar 2026 06:18:56 +0000</pubDate>
      <link>https://dev.to/soumya_k19/network-optimization-guide-gamingstreaming-3fbn</link>
      <guid>https://dev.to/soumya_k19/network-optimization-guide-gamingstreaming-3fbn</guid>
      <description>&lt;h1&gt;
  
  
  How I Reduced Gaming Latency by 192ms on a Locked ISP Network
&lt;/h1&gt;

&lt;h2&gt;
  
  
  🔗 Project Repository
&lt;/h2&gt;

&lt;p&gt;GitHub: &lt;a href="https://github.com/SoumyaKhaskel/Network-router-optimization.git" rel="noopener noreferrer"&gt;https://github.com/SoumyaKhaskel/Network-router-optimization.git&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Most gaming setup posts focus on GPU, RAM, or CPU tuning.
&lt;/h3&gt;

&lt;p&gt;This one is about the part people usually ignore: the network path.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;I worked on a single NAT home network with an ISP-locked ONT and limited router access, then documented every change with before/after testing. The goal was simple: reduce latency spikes, stabilize the connection, and improve responsiveness for CS2 and Valorant.&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What I was dealing with
&lt;/h3&gt;

&lt;p&gt;The setup had a few hard constraints:&lt;/p&gt;

&lt;p&gt;ISP-locked main gateway&lt;br&gt;
No custom firmware support on the existing router hardware&lt;br&gt;
No proper port-forwarding control from the admin panel&lt;br&gt;
Windows 11 Home, so no Group Policy editor for QoS&lt;br&gt;
Bufferbloat on the download side under load&lt;/p&gt;

&lt;p&gt;That meant the fix had to be practical, measurable, and done mostly from the OS side.&lt;/p&gt;

&lt;p&gt;Baseline testing first&lt;br&gt;
Before changing anything, I measured the network.&lt;/p&gt;

&lt;h4&gt;
  
  
  A few key baseline findings:
&lt;/h4&gt;

&lt;p&gt;Google DNS averaged around 43ms&lt;br&gt;
Cloudflare DNS averaged around 4–5ms&lt;br&gt;
Fast.com showed idle latency of 3ms but loaded latency of 64ms&lt;br&gt;
Waveform bufferbloat testing confirmed download-side bufferbloat&lt;br&gt;
The peak download ping was high enough to fail low-latency gaming thresholds&lt;/p&gt;

&lt;p&gt;That gave me a clear starting point. No guessing. Only data.&lt;/p&gt;

&lt;h3&gt;
  
  
  What I changed:
&lt;/h3&gt;

&lt;h4&gt;
  
  
  1) Switched DNS to Cloudflare
&lt;/h4&gt;

&lt;p&gt;The DNS tests made the decision obvious. Cloudflare was much faster than the ISP default, so I configured 1.1.1.1 / 1.0.0.1 directly on the Windows adapter, including IPv6, to avoid fallback to the ISP resolver.&lt;/p&gt;

&lt;h4&gt;
  
  
  2) Locked the gaming PC to a static IP
&lt;/h4&gt;

&lt;p&gt;DHCP changes were a problem for consistency, so I set a manual static IP on the Windows Ethernet adapter. That made the machine easier to target for QoS and kept the address stable across reboots.&lt;/p&gt;

&lt;h4&gt;
  
  
  3) Verified MTU
&lt;/h4&gt;

&lt;p&gt;I checked MTU using the DF flag ping method and confirmed MTU 1500. No fragmentation changes were needed.&lt;/p&gt;

&lt;h4&gt;
  
  
  4) Applied DSCP 46 QoS for game traffic
&lt;/h4&gt;

&lt;p&gt;For real-time UDP traffic, I applied DSCP 46 (Expedited Forwarding) for CS2 and Valorant through Windows registry-based QoS policy entries, since Windows 11 Home does not provide the usual Group Policy path.&lt;/p&gt;

&lt;h4&gt;
  
  
  5) Tuned the TCP stack
&lt;/h4&gt;

&lt;p&gt;I used TCP Optimizer to improve the Windows TCP stack behavior for latency-sensitive traffic. One setting, TCP Chimney, caused upload latency spikes on my NIC, so I reverted it after testing. That part mattered: I kept only what was actually stable.&lt;/p&gt;

&lt;p&gt;What did not work&lt;br&gt;
Not every route was available.&lt;/p&gt;

&lt;p&gt;The router hardware did not support the firmware path I wanted&lt;br&gt;
The ISP ONT was locked&lt;br&gt;
Port forwarding was blocked by the admin panel&lt;br&gt;
Router-level DNS changes did not fully apply as expected&lt;br&gt;
That is normal in real-world consumer networking. The important part is documenting the ceiling, not pretending it does not exist.&lt;/p&gt;

&lt;h2&gt;
  
  
  Results
&lt;/h2&gt;

&lt;p&gt;The improvements were measurable:&lt;/p&gt;

&lt;p&gt;Google DNS max spike dropped from 228ms to 36ms&lt;br&gt;
Google DNS average dropped from 45ms to 32ms&lt;br&gt;
Download-side bufferbloat improved from 41ms spike to 34ms&lt;br&gt;
Peak download ping dropped from 82.4ms to 57.49ms&lt;/p&gt;

&lt;p&gt;The network was better after optimization, but the remaining bufferbloat was still limited by ISP hardware. That meant the final fix would require a compatible router with SQM support, not just software tuning.&lt;/p&gt;

&lt;h3&gt;
  
  
  Main takeaway
&lt;/h3&gt;

&lt;p&gt;The biggest lesson was this: If download latency spikes while upload stays clean, the bottleneck is often inside the ISP hardware.&lt;br&gt;
You can still improve performance from the OS side, but there is a hard ceiling when the modem/ONT cannot be controlled.&lt;/p&gt;

&lt;p&gt;What I learned&lt;br&gt;
DNS choice can make a real difference depending on location&lt;br&gt;
DSCP 46 is the correct priority class for time-sensitive UDP traffic&lt;br&gt;
MTU should be verified, not assumed&lt;br&gt;
TCP tweaks should always be benchmarked&lt;br&gt;
Static IP at adapter level is often more reliable than router-side reservation in locked environments&lt;br&gt;
Bufferbloat fixes are limited if the ISP hardware cannot be replaced.&lt;/p&gt;

</description>
      <category>networking</category>
      <category>productivity</category>
      <category>webdev</category>
      <category>performance</category>
    </item>
  </channel>
</rss>
