Overcoming Obstacles: My Journey in Cybersecurity

BLOG

CypherOxide

10/17/20232 min read

"In the world of technology, the only constant is change"

When I embarked on my path towards a career in IT Cybersecurity back in 2010, little did I know the twists and turns that awaited me. At the time, I was enrolled in an Automotive Technician program at the local community college, blissfully unaware of the captivating world of ethical hacking and cybersecurity. My introduction to this fascinating field was quite unconventional – it all began with an innocent YouTube video recommendation.

Intrigued by the concept of Linux as an alternative to Windows and Mac, I had been exploring various Linux distributions, enchanted by their customizability, freedom, and, of course, the enticing cost factor of zero dollars. But that fateful YouTube recommendation changed the trajectory of my journey entirely. It was a tutorial on creating a persistent BackTrack 4 USB drive, and it ignited a spark within me.

I found myself tumbling down a rabbit hole, captivated by hacking tutorials and pentesting videos that seemed to stretch endlessly into the night. I was fueled by countless cups of coffee from the nearby 24-hour cafe as I devoured knowledge. The moment I successfully created that BackTrack 4 USB, I knew I was hooked on ethical hacking and cybersecurity.

My obsession led me to explore hacking forums, experiment with numerous bootable distros, and become well-acquainted with a wide array of operating systems – from BackTrack to Blackbuntu, Cyberhawk, and CAINE. I couldn't even keep track of how many times I booted up live USBs with the latest pentesting distros.

Every YouTube tutorial I could find, every interesting hacker tool on GitHub, and every piece of media related to hacking and security testing became my educational playground. But then, I discovered an even deeper layer of Linux – the power of the command line and bash scripting.

In late 2011, I wrote my very first bash script to automate mundane tasks on system boot-up. From updating the system to launching my essential pentesting tools, my script made my life as a burgeoning hacker considerably easier.

However, as fate would have it, my hacker journey encountered a significant obstacle. Being a cash-strapped cybersecurity student, I was faced with a tough choice for my new laptop – should I splurge on a high-end system or opt for something more budget-friendly? My wallet made the decision, and affordability took precedence.

Suddenly, I found myself in the shoes of a stereotypical hacker/IT student, surrounded by multiple monitors, a mechanical keyboard, and a collection of Capture The Flag (CTF) participation badges, but saddled with a mid-range laptop. My dreams of running virtual machines seamlessly were shattered – even two VMs would bring my laptop to a grinding halt. My ambitions for bash scripting were thwarted – I struggled to install the latest version of Kali Linux properly for dual boot. I was left with live USB distros and online Integrated Development Environments (IDEs) once more.

Yet, it is often said that limitations foster creativity. I adapted to my circumstances, focusing more on web application testing, refining my Python skills, and delving into cloud technologies like AWS. The constraints of affordability led me to explore alternative avenues in cybersecurity that I might never have ventured into otherwise.

The key lesson from this journey is the importance of adaptability, creativity, and unwavering determination in advancing your skills, even when faced with seemingly insurmountable obstacles. While my trusty mid-range laptop may have temporarily slowed me down, it ultimately made me a stronger, wiser, and more versatile IT security professional in the making.

Remember, the path to cybersecurity is not always a straight line – it's filled with unexpected turns and challenges. Embrace them, learn from them, and let them mold you into the cybersecurity professional you aspire to be.

Related Stories