Life Lessons from the Hacking World

theblxckcicadatheblxckcicada
3 min read

I've been exploring the world of cybersecurity and hacking for some time now. It's a vast field with different specializations just like any other tech-related area. Rather than delving into the technical aspects of hacking, I'd like to share what I've learned about life from it.

Life is a complex concept that can be explained in many ways and linked to our daily activities. Throughout this journey, you may come across some unfamiliar terms. Let me explain one of them - hacking. Hacking involves five phases, namely Reconnaissance, Enumeration, Exploitation (Foothold), Escalation (Pivoting), and Covering Tracks. These phases are a continuous cycle, and I will provide you with a clear picture as I delve into each one except for the last.

I will map out the different phases and describe what life would look like during each phase. Everyone has goals in life. These goals can be daily, weekly, monthly, quarterly, yearly, or more long-term. However, not all goals are easy to achieve. Similarly, in hacking, if my goal as an individual hacker is to compromise a company's servers to get my dream job, where do I begin?

Here's how the phases of network penetration testing can be metaphorically mapped to career progression in life:

  • Reconnaissance: In this phase, you gather information about the field you want to enter. This could be analogous to studying at a college or university, pursuing online certifications, and researching potential employers.

    • Life: Researching industries, understanding job roles, gaining foundational knowledge, networking with professionals, and preparing your resume.

Phase 2: Enumeration (Skill Application and Internships)

  • Enumeration: You identify which services are running and their vulnerabilities, similar to identifying job opportunities and applying your skills.

    • Life: Applying for internships or entry-level positions, attending job fairs, and securing interviews. This phase involves showcasing your skills and knowledge to potential employers.

Phase 3: Exploitation (Securing a Job and Early Career)

  • Exploitation: Here, you exploit a discovered vulnerability to gain initial access, akin to securing a job.

    • Life: Successfully landing an internship or a first job after completing the interview process. You start working, gaining practical experience, and proving your worth to the company.

Phase 4: Escalation (Career Advancement)

  • Escalation: You leverage the access gained to escalate privileges, reflecting career growth and promotions.

    • Life: Continuously improving your skills and knowledge, taking on more responsibilities, and earning promotions. You may become proficient and efficient, leading to higher positions like senior roles or management.

Phase 5: Achieving Senior Roles (Executive Leadership)

  • Advanced Pivoting and Domain Access: After repeated cycles of learning and applying your skills, you gain access to critical systems (domain controller), analogous to reaching executive positions.

    • Life: Achieving high-level roles such as department head, senior management, or executive leadership. This reflects the culmination of your career growth and expertise.

Summary

We didn't discuss the obstacles that you may face during phases 1 and 4, such as firewalls and antivirus software. To succeed, you will need to find ways to bypass the company's defenses. As you move up the ladder, you will encounter more challenges that may be even tougher than the ones before. These could include competition for promotions, sabotage from colleagues, and lack of respect. However, you must overcome them to succeed.

0
Subscribe to my newsletter

Read articles from theblxckcicada directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

theblxckcicada
theblxckcicada