5 Years of InfoSec Focused Homelabbing
The blog post reflects on five years of InfoSec homelabbing, emphasizing applied learning, balanced CTF participation, CVE analysis for experience, and adapting older resources to modern tools for effective learning.
Read original articleThe blog post from Arch Cloud Labs reflects on five years of documenting InfoSec-focused homelabbing, initiated with the first post on September 22, 2019. The author shares how this journey evolved from a personal project aimed at enhancing their resume to a platform that led to teaching opportunities, job offers, and contributions to significant security projects. The post emphasizes the importance of applied learning, encouraging readers to engage with concepts through practical experimentation rather than just theoretical study. It suggests that creating "toy examples" can enhance understanding and make learning enjoyable. The author also critiques the common advice to participate in Capture The Flag (CTF) competitions continuously, advocating instead for a balanced approach that includes reviewing past challenges and engaging with the CTF community. Additionally, the post highlights the value of analyzing Common Vulnerabilities and Exposures (CVEs) as a means of gaining real-world experience. The author encourages readers to explore their interests in InfoSec without the pressure of competition, and to leverage older technical books by adapting their teachings to modern tools. The conclusion reinforces the idea that blogging about one's learning journey can enhance technical communication skills and foster a more enjoyable learning experience.
- The blog chronicles five years of InfoSec homelabbing and its impact on the author's career.
- Emphasizes the importance of applied learning through practical experimentation.
- Advocates for a balanced approach to CTF participation and community engagement.
- Highlights the value of analyzing CVEs for real-world experience.
- Encourages adapting older technical resources to modern tools for continued learning.
Related
What does “Security is our top priority” really mean?
The blog questions the validity of "Security Is Our Top Priority" in organizations, advocating for a balanced approach to security without neglecting user experience. It suggests a scoring mechanism for risk assessment.
Learn in Public (2018)
The "Learning in Public" concept encourages sharing knowledge through blogs and forums, enhancing understanding, attracting mentorship, and creating professional opportunities, ultimately fostering a community of growth in the tech field.
The Book of Secret Knowledge
The GitHub repository "The Book of Secret Knowledge" offers a curated collection of resources for IT professionals, covering various tools and topics, and encourages community contributions while being actively maintained.
The tragedy of low-level exploitation
The blog post outlines the challenges of pursuing a career in low-level exploitation in cybersecurity, noting limited job opportunities and the preference for existing exploits over new development.
How I started blogging (2024)
The author shares their blogging journey, overcoming self-doubt and finding joy in idea generation and feedback. They encourage others to start blogging for authentic expression and personal growth.
The archcloudlabs blog and Jared's presentations helped guide my own homelab, a large honeypot, and motivated me to journal about my projects more.
Thank you for continuing to share so much and helping me grow in my security knowledge.
chaosmarmot
Related
What does “Security is our top priority” really mean?
The blog questions the validity of "Security Is Our Top Priority" in organizations, advocating for a balanced approach to security without neglecting user experience. It suggests a scoring mechanism for risk assessment.
Learn in Public (2018)
The "Learning in Public" concept encourages sharing knowledge through blogs and forums, enhancing understanding, attracting mentorship, and creating professional opportunities, ultimately fostering a community of growth in the tech field.
The Book of Secret Knowledge
The GitHub repository "The Book of Secret Knowledge" offers a curated collection of resources for IT professionals, covering various tools and topics, and encourages community contributions while being actively maintained.
The tragedy of low-level exploitation
The blog post outlines the challenges of pursuing a career in low-level exploitation in cybersecurity, noting limited job opportunities and the preference for existing exploits over new development.
How I started blogging (2024)
The author shares their blogging journey, overcoming self-doubt and finding joy in idea generation and feedback. They encourage others to start blogging for authentic expression and personal growth.