Learning Journey
A public log of what I'm learning, building, and breaking. Consider this my digital learning journal — raw, honest, and always evolving.
Currently Learning
Web Exploitation
65%SQL injection, XSS, CSRF, and advanced web vulnerabilities
Resources:
PortSwigger Web Security AcademyPentesterLabHackTheBox
Blockchain Security
45%Smart contract auditing, DeFi vulnerabilities, and consensus attacks
Resources:
EthernautDamn Vulnerable DeFiSecurity Research Papers
ML for Cybersecurity
55%Anomaly detection, threat intelligence, and adversarial ML
Resources:
Stanford CS229Kaggle CompetitionsResearch Papers
Weekly Learning Logs
Week of Jan 15, 2025
Highlights:
- ▹Solved 5 CTF challenges on HackTheBox focusing on privilege escalation
- ▹Learned about time-based blind SQL injection techniques
- ▹Built a proof-of-concept for detecting XSS vulnerabilities using regex patterns
- ▹Read 'The Art of Exploitation' chapters on buffer overflows
Key Takeaway:
Patience is crucial in security research — sometimes the answer is in the HTTP headers you ignored.
Week of Jan 8, 2025
Highlights:
- ▹Completed Solidity smart contract security module
- ▹Analyzed reentrancy attack patterns in DeFi protocols
- ▹Participated in nCreeps team CTF competition (placed top 20)
- ▹Started building automated OSINT tool for blockchain analysis
Key Takeaway:
Understanding the 'why' behind a vulnerability is more valuable than just knowing it exists.
Week of Jan 1, 2025
Highlights:
- ▹Set learning goals for Q1 2025
- ▹Configured new VAPT testing environment with Kali Linux
- ▹Explored machine learning models for malware classification
- ▹Documented Unitie security architecture decisions
Key Takeaway:
Good documentation is security's best friend — future you will thank present you.
"Learning isn't linear. Some weeks you'll solve complex challenges in hours. Other weeks, you'll stare at a single vulnerability for days. Both are progress. The goal isn't perfection — it's showing up every day with curiosity intact."