Wednesday, February 18, 2026

๐Ÿ“— PHASE 2: Web Security Core (Month 3–4)

 

๐Ÿ“— PHASE 2: Web Security Core (Month 3–4)


๐Ÿ”ฅ OWASP Top 10 (Very Important)

1️⃣ SQL Injection

Vulnerable code:

SELECT * FROM users WHERE username = '$user';

Attack:

' OR '1'='1

Fix:

  • Prepared statements

  • Parameterized queries


2️⃣ XSS (Cross-Site Scripting)

Stored XSS:

  • Malicious script saved in DB

Reflected XSS:

  • Injected via URL

Fix:

  • Escape output

  • Use Content Security Policy


3️⃣ CSRF

User logged in → attacker forces request.

Fix:

  • CSRF tokens


4️⃣ Broken Authentication

Fix:

  • Strong hashing (bcrypt)

  • Secure session handling

Tuesday, February 17, 2026

๐Ÿš€ CYBERSECURITY COMPLETE ROADMAP (Beginner → Advanced) ๐Ÿ“˜ PHASE 1: Foundations (Month 1–2)

 

๐Ÿš€ CYBERSECURITY COMPLETE ROADMAP (Beginner → Advanced)


๐Ÿ“˜ PHASE 1: Foundations (Month 1–2)


1️⃣ Networking Deep Dive (Core Backbone)

๐Ÿ”น What You Must Understand

OSI Model (7 Layers)

Layers:

  1. Physical

  2. Data Link

  3. Network

  4. Transport

  5. Session

  6. Presentation

  7. Application

๐Ÿ‘‰ Real understanding:

  • HTTP works at Application layer

  • TCP works at Transport layer

  • IP works at Network layer


TCP vs UDP

TCPUDP
ReliableFast
Connection orientedConnectionless
Used in HTTPSUsed in streaming

Important Concepts

  • IP Address (IPv4, IPv6)

  • Subnetting

  • DNS (How google.com becomes IP)

  • ARP

  • Ports (80, 443, 22, 21, 3306)

  • Three-way handshake (SYN → SYN-ACK → ACK)


Tools Practice

  • Wireshark → Capture packets

  • ping, traceroute

  • netstat

  • nslookup


2️⃣ Linux Mastery (Month 1–2)

Install:

  • Kali Linux (VirtualBox)

Learn:

File Structure

  • /etc

  • /var

  • /home

  • /bin

  • /root

Important Commands

ls cd chmod chown grep cat nano find ps kill apt install

Permissions

Example:

-rwxr-xr--

Meaning:

  • Owner: read write execute

  • Group: read execute

  • Others: read


3️⃣ Programming for Security

Since you're a developer, focus on:

Python

  • Variables

  • Loops

  • Functions

  • Requests library

  • Sockets

Example:

import socket print(socket.gethostbyname("google.com"))

Cybersecurity journey ๐Ÿ’ป Phase 3: Practical Hacking Practice (4–8 Months)

 

๐Ÿ’ป Phase 3: Practical Hacking Practice (4–8 Months)

Never hack real websites ❌
Practice legally on platforms:

  • TryHackMe

  • Hack The Box

  • PortSwigger Web Security Academy

Start with beginner rooms.


๐Ÿงช Phase 4: Tools You Must Learn

ToolPurpose
NmapNetwork scanning
Burp SuiteWeb app testing
MetasploitExploitation
WiresharkPacket analysis
John the RipperPassword cracking
HydraBrute force

๐ŸŽ“ Certifications (Optional but Powerful)

Start with:

  • CEH (Certified Ethical Hacker)

  • CompTIA Security+

  • eJPT (Beginner friendly)

Cybersecurity journey ๐Ÿ›ก Phase 2: Core Cybersecurity Concepts (2–4 Months)

 

๐Ÿ›ก Phase 2: Core Cybersecurity Concepts (2–4 Months)

๐Ÿ” 1. Types of Cybersecurity

Understand domains:

  • Ethical Hacking

  • Web Security

  • Network Security

  • Cloud Security

  • Digital Forensics

  • SOC Analyst

  • Malware Analysis


๐ŸŒ 2. Web Application Security (Very Important for You)

Since you build web apps like:

  • Student Management System

  • V-Connect

  • Jinni Shopping App

You should learn how they can be attacked.

Study:

  • SQL Injection

  • XSS (Cross Site Scripting)

  • CSRF

  • Authentication bypass

  • Session hijacking

Resource:
๐Ÿ‘‰ OWASP Top 10

Cybersecurity journey Phase 1: Build Strong Foundations (0–2 Months)

 

Phase 1: Build Strong Foundations (0–2 Months)

Before jumping into hacking tools, master the basics.

๐Ÿ–ฅ 1. Computer Networking (Very Important)

Learn:

  • OSI & TCP/IP model

  • IP, Subnetting

  • DNS, DHCP

  • HTTP / HTTPS

  • Ports & Protocols

Tools to explore:

  • Wireshark

  • Packet Tracer


๐Ÿง 2. Linux Fundamentals

Most cybersecurity tools run on Linux.

Learn:

  • File system structure

  • Commands (ls, grep, chmod, nano, etc.)

  • Users & permissions

  • Process management

Install:

  • Kali Linux (Virtual Machine using VirtualBox)


๐Ÿง  3. Basic Programming

Since you already work with PHP, Node.js, Firebase — that’s a big advantage.

Focus on:

  • Python (for automation & scripting)

  • Bash scripting

  • Basic understanding of JavaScript vulnerabilities

Saturday, January 24, 2026

Day three of theory of computation

 1. Non-deterministic Finite Automata (NFA) 

Unlike a DFA, an NFA allows a machine to explore multiple paths simultaneously. 
  • Definition: For a given state and input symbol, an NFA can transition to zero, one, or multiple states.
  • Acceptance: A string is accepted if at least one possible path leads to a final state.
  • Flexibility: NFAs are generally easier to construct than DFAs because you don't need to define transitions for every possible input or worry about "dead states". 
2. NFA with Epsilon Transitions (
ฯตepsilon
-NFA) 
An
ฯตepsilon
-NFA introduces the epsilon (
ฯตepsilon
) move
, which allows the machine to change states without consuming any input symbol. 
  • ฯตepsilon
    -Closure:
    This is a critical Day Three concept. It is the set of all states reachable from a specific state using only
    ฯตepsilon
    transitions (including the state itself).
  • Use Case:
    ฯตepsilon
    -NFAs are highly useful for combining smaller machines (e.g., when implementing the "union" or "star" operations in Regular Expressions).
     
3. Equivalence of NFA and DFA (Subset Construction) 
The most important takeaway of Day Three is that NFAs and DFAs are equally powerful; they both recognize the same class of languages (Regular Languages). 
  • Conversion: Any NFA can be converted to an equivalent DFA using the Subset Construction (or Powerset Construction) algorithm.
  • State Explosion: While an NFA with
    nn
    states is simpler, its equivalent DFA may have up to
    2n2 to the n-th power
    states
    in the worst case.

๐Ÿ“— PHASE 2: Web Security Core (Month 3–4)

  ๐Ÿ“— PHASE 2: Web Security Core (Month 3–4) ๐Ÿ”ฅ OWASP Top 10 (Very Important) 4 1️⃣ SQL Injection Vulnerable code: SELECT * FROM users WHERE ...