Hello, again, again, and again! 

Today, I completed learning how to detect server-side attacks from /var/log. I also found a way to use different parts of the logs, such as the user agent, to identify automated tools being used.

I also used Wireshark to analyze a brute-force attack and successfully recovered the password.

Then I started studying deep learning for my final-year exams, and I think I’m going to pause my 100 Days of Cybersecurity until my exams are over. 💪😭

#Day89 #100DaysOfCybersecurity #cybersecurity

Hello, again, again, and again! 

Today, I solved FTP-related problems using Snort, and I found various ways to detect whether there is a brute-force attempt or if the attacker has succeeded.

#Day88 #100DaysOfCybersecurity #cybersecurity

Hello, again, again and again! 

I started by working through the web security room, focusing on client-side vulnerabilities and how attackers can exploit them.

Then I moved on to a Snort challenge room, where I’ve started writing rules to detect anomalies.

Now I’m finally beginning the project—I’ve got my setup ready and everything in place to start building.

#Day87 #100DaysOfCybersecurity #Cybersecurity

Hello, again, again and again! 

Today, I started with the web security module and solved the interactive challenge.

Then I went through the last video of CS50x, and now only the project submission is left.

I’m going to work on a Phishing Email Detection system with signature-based and LLM-based detection—deterministic first, and then an LLM layer on top.

#Day86 #100DaysOfCybersecurity #Cybersecurity

Hello, again and again! 

Today, I completed the Snort room, where I learned how to use both IDS and IPS modes in Snort. I practiced extensively, solved related questions, and also learned how to create custom Snort rules.

Additionally, I have successfully completed all the problem sets for CS50x and am now moving on to the final project.

#Day85 #100DaysOfCybersecurity #Cybersecurity

Hello, again and again! 

Today was partly consumed by college work—I had to go in to get assignments checked, which took a significant portion of the day.

After returning home, I got some focused time to continue practicing with Snort. I worked on using it as an IDS by loading configurations with the -c flag, which helped me better understand how rule-based detection works.

I’m also very close to completing the final part of CS50x now.

#Day84 #100DaysOfCybersecurity #Cybersecurity

Hello, again and again! 

Today, I practiced using Snort for real-time traffic analysis on the eth0 interface. I explored different flags to read and interpret log files more effectively. In addition, I used tcpdump to analyze network traffic and worked through a few related questions to reinforce my understanding.

After that, I spent some time on my college written assignments. Finally, I’m very close to finishing the last problem set—it feels like the end of a long journey, and there’s a strong sense of progress and reflection that comes with it.

#Day83 #100DaysOfCybersecurity #Cybersecurity

Hello again! 

Today, I started with the Snort room. It’s a really powerful tool, functioning as both an IPS and IDS, and I was able to test configurations using the -T and -c flags.

Then I took an exam for a cybersecurity internship with a company in Bengaluru, and it went great.

Finally, I began working on the Finance problem set, which is the last problem in the CS50x course.

#Day82 #100DaysOfCybersecurity #Cybersecurity

Hello again! 

Today I completed the Man-in-the-Middle (MITM) attack room, where I learned about ARP poisoning, DNS spoofing, and SSL stripping. It was interesting to understand how an attacker within the same network can intercept and manipulate traffic, which really emphasizes the importance of secure communication and proper network defenses.

On the development side, I finished the CS50x “Birthday” problem set. I implemented database insertion, added both client-side and server-side validation to properly sanitize user input, and used a Jinja for loop to dynamically render the birthday entries in a table. Although it wasn’t required, I also implemented a remove button to enhance functionality.

#Day81 #100DaysOfCybersecurity #Cybersecurity

Hello again! 

Today, I focused on understanding how to identify ARP poisoning attacks and detect anomalies in network traffic. I applied this knowledge by solving related TryHackMe questions.

After that, I completed the Flask lecture section of CS50x and have now started working on the Birthday web app problem set.

#Day80 #100DaysOfCybersecurity #Cybersecurity