{"id":24,"date":"2025-04-11T09:47:40","date_gmt":"2025-04-11T09:47:40","guid":{"rendered":"https:\/\/hackingwithj.com\/?page_id=24"},"modified":"2025-05-09T12:09:42","modified_gmt":"2025-05-09T12:09:42","slug":"about","status":"publish","type":"page","link":"https:\/\/hackingwithj.com\/?page_id=24","title":{"rendered":"About"},"content":{"rendered":"\n<p>Hi, I\u2019m J \u2014 an aspiring ethical hacker at the start of my journey into the world of cybersecurity and penetration testing.<\/p>\n\n\n\n<p>This blog is my personal space to document everything I\u2019m learning along the way: from understanding web vulnerabilities like <strong>broken access controls and open directories<\/strong>, to exploring hands-on tools like <strong>Burp Suite, OWASP ZAP, Gobuster, and Nikto<\/strong>.<\/p>\n\n\n\n<p>I\u2019m not here to break things just for the sake of it \u2014 I believe in <strong>responsible disclosure<\/strong>, continuous learning, and sharing knowledge openly. My focus is on developing real-world skills through practical testing, experimentation, and curiosity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why this blog?<\/h3>\n\n\n\n<p>Because everyone starts somewhere \u2014 and I want to show the <em>real<\/em> process of leveling up in cybersecurity. The wins, the weird bugs, the dead ends, the lightbulb moments\u2026 it\u2019s all part of the journey.<\/p>\n\n\n\n<p>This blog helps me:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Track my growth and learning in a structured way<\/li>\n\n\n\n<li>Build a public portfolio for future roles in cybersecurity<\/li>\n\n\n\n<li>Connect with others who share the same passion<\/li>\n<\/ul>\n\n\n\n<p>Whether you\u2019re a beginner like me, a seasoned pentester looking for a familiar story, or a recruiter searching for someone with passion and potential \u2014 welcome. Grab a coffee, dive in, and explore my findings, failures, and future exploits.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Wall of Impact<\/h2>\n\n\n\n<p>While I&#8217;m still building my skills in cybersecurity, I&#8217;ve already had the opportunity to find and report several vulnerabilities. These aren&#8217;t the most complex or high-profile hacks, but they represent my first real-world encounters and the start of my journey into hacking. Here&#8217;s a snapshot of my contributions so far:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>#<\/strong><\/td><td><strong>Issue Description<\/strong><\/td><td><strong>Status<\/strong><\/td><td><strong>Action Taken<\/strong><\/td><\/tr><tr><td>1<\/td><td>Outdated library with known exploit (found in Exploit-DB)<\/td><td>\u2705 Reported<\/td><td>Confirmed and under review<\/td><\/tr><tr><td>2<\/td><td>Plaintext credentials exposed in log files<\/td><td>\u2705 Fixed<\/td><td>Issue logged and resolved<\/td><\/tr><tr><td>3<\/td><td>Sensitive user data (PII) being written to application logs<\/td><td>\u2705 Fixed<\/td><td>Reported, patch applied<\/td><\/tr><tr><td>4<\/td><td>Ability to download full-quality photoshoot images without watermark or payment<\/td><td>\u2705 Reported<\/td><td>Access now restricted properly<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>While these may seem like small steps, they represent valuable learning experiences and a solid foundation in real-world security. Each of these findings taught me something new, and I\u2019m eager to continue making an impact as I sharpen my skills and dive deeper into the world of hacking.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hi, I\u2019m J \u2014 an aspiring ethical hacker at the start of my journey into the world of cybersecurity and penetration testing. This blog is my personal space to document everything I\u2019m learning along the way: from understanding web vulnerabilities like broken access controls and open directories, to exploring hands-on tools like Burp Suite, OWASP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"class_list":["post-24","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/pages\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackingwithj.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=24"}],"version-history":[{"count":4,"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/pages\/24\/revisions"}],"predecessor-version":[{"id":178,"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/pages\/24\/revisions\/178"}],"wp:attachment":[{"href":"https:\/\/hackingwithj.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}