Journey into Cybersecurity

Hi, I’m Muhammad Husnain Zargar – a passionate cybersecurity enthusiast, ethical hacker, and the creator behind HackwithHusnain.

Discovering Hacking in 10th Grade

My journey into cybersecurity began when I was in 10th grade. Right after my matric exams, I became curious about hacking. I remember watching YouTube videos and trying to hack Android phones using MSFvenom, not realizing back then that I was experimenting with reverse shells.

First Challenges with MSFvenom and Reverse Shells

Those early days were filled with challenges. I struggled to generate a working payload – errors after errors. But after days of trying, I finally created one successfully. However, I didn’t know how to deliver it to the victim and make it run. Overwhelmed and unsure about the legality of hacking, I stepped back and decided to explore other fields.

A Turning Point: Discovering Cybersecurity in 11th Grade

Everything changed in 11th grade when I saw a Cybersecurity Bootcamp ad online. The lock icon and computer graphic intrigued me. I googled “What is cybersecurity?” and discovered that it’s all about protecting computers and digital information from threats. I also learned about the huge demand for cybersecurity experts. This changed everything.

Choosing Cybersecurity Over Software Engineering

As I explored more, I came to know that ethical hacking is a legal and respected part of cybersecurity, and companies actually pay for it. That’s when I realized: this is what I was truly passionate about.

By the time I finished my 11th-grade exams, I was torn between software engineering and cybersecurity. When I spoke to my father about it, he introduced me to a friend working in cybersecurity. That conversation gave me clarity: follow your passion. He confirmed that cybersecurity is a growing field with a promising future. That was the turning point – I decided to pursue cybersecurity professionally.

Building a Foundation with Networking and Cisco Certifications

As I began building my skills, I knew that networking was the backbone of cybersecurity. So, I started learning the fundamentals by enrolling in Cisco’s “Introduction to Cybersecurity” course. That initial step sparked something in me, and soon after, I went deeper—earning certifications in Networking Basics, Addressing, and Initial Device Configurations. It wasn’t easy, especially coming from a biology background and FSc pre-engineering. I had not studied computer science before, but with time and consistency, I developed a solid foundation in how networks operate.

Exploring Network Traffic with Wireshark

Once I understood the flow of data, I started exploring Wireshark, a powerful tool for capturing and analyzing network traffic. I analyzed protocols like TCP, UDP, DNS, HTTP, and even secure tunneling protocols like OpenVPN and WireGuard—all at the packet level. This hands-on experience made abstract concepts real.

Diving into Linux and Attempting SIEM Setup

To broaden my perspective, I also dove into Linux, which is essential for both blue team (defensive) and red team (offensive) work. I installed a virtual machine, practiced terminal commands, navigated file systems, and managed users. I also attempted to set up Splunk SIEM and configured a rule to alert me on failed login attempts. Although I initially struggled to interpret the logs and eventually uninstalled it, this experience taught me that failing is just another step toward learning.

Projects That Shaped My Skills

From there, I took on several projects that gave me a deeper understanding of both offensive and defensive tactics:

  • I configured iptables to block Nmap scans, learning how firewalls detect and stop reconnaissance.
  • I simulated VLAN segmentation in Cisco Packet Tracer to understand the importance of network isolation and segmentation.
  • One of my most exciting milestones was exploiting Windows 7 using Metasploit. I set up an isolated virtual lab, scanned for vulnerabilities using Nmap, and finally achieved remote code execution, marking my first successful ethical hack.

Building a Cybersecurity Home Lab

As my interest shifted more toward Red Teaming, I built a cybersecurity home lab, simulated DoS attacks using Slowloris, analyzed the impact through packet captures, and configured tools like Snort IDS and Wazuh SIEM to detect suspicious activities. These real-world scenarios gave me a sense of how attackers think and how defenders respond.

Sharing Knowledge Through My Blog

I realized early on that the best way to learn deeply was to teach others. That’s why I started my blog, HackwithHusnain.com. I began writing in-depth guides and technical breakdowns, covering topics like:

  • How WannaCry ransomware works
  • Techniques for bypassing firewalls with Nmap and analyzing the traffic with Wireshark
  • Step-by-step Windows 7 exploitation tutorials
  • Explanations of network fundamentals, such as the TCP 3-way handshake
  • Cybersecurity roadmaps for beginners who, like me, were starting with curiosity and no clear direction

Concept Before Tools: A Mindset for Mastery

When it came to tools, I never rushed into them. I made sure I understood the concepts first:

  • I studied cryptography before using password-cracking tools like John the Ripper and Hashcat
  • Learned how Wi-Fi works before launching attacks with Aircrack-ng
  • And read up on web application security before using Burp Suite

This foundational mindset helped me succeed in earning several key certifications.

Key Certifications Earned Along the Way

  • Google Cybersecurity Professional Certificate
  • Ethical Hacking Essentials (EHE) by EC-Council
  • ISC2 CC
  • eJPTv2 by INE — a milestone that solidified my technical confidence

What This Journey Has Taught Me

What I’ve learned so far is that networking truly is the foundation of cybersecurity. Linux is the heartbeat of ethical hacking, giving you the flexibility and control most tools require. I discovered that tools aren’t magic—you have to understand why, when, and how to use them effectively.

Throughout this journey, my mindset mattered more than my toolkit: staying curious, being consistent, and pushing through challenges made the real difference. And yes, failure was a huge part of my learning—whether it was misconfiguring Splunk or failing to bypass a firewall, every mistake helped me grow.

The Road Ahead: Cybersecurity as a Lifelong Journey

Finally, I believe that teaching reinforces learning. Every article I wrote helped me understand the topic even better. And most importantly, I’ve realized that cybersecurity isn’t a destination—it’s a continuous journey, and I’m just getting started.