class ManaJyotiBoro:
name = "Manas Jyoti Boro"
degree = "B.Tech Information Technology"
goal = "To have real worl experience in the field of cybresecurity"
domain = "Blue Team"
learning = ["Networking", "Linux", "SOC", "SIEM", "CTFs"]
currently = "Building cybersecurity foundations from scratch"
motto = "Every expert was once a beginner. Show up daily."I am a B.Tech IT student actively transitioning into cybersecurity. I have chosen SOC / Blue Team as my primary domain β the most in-demand entry-level cybersecurity role in India. I document everything I learn publicly β networking theory, Linux challenges, SOC labs, Wireshark practicals, and tool usage β both to build a portfolio and to hold myself accountable to learn something new every single day.
- π‘ Networking Theory + Practicals β OSI, TCP/IP, DNS, Firewalls, HTTP/HTTPS, Wireshark β
- π§ Linux β OverTheWire Bandit Wargames (15/34 levels complete) π
- π΅ SOC / Blue Team β TryHackMe SOC Level 1, SIEM fundamentals π
- π΄ CTF Competitions β PicoCTF, Hack The Box β³
- π§ Tools β Splunk, Nmap, Burp Suite β³
I maintain a dedicated repository documenting my entire cybersecurity journey. Updated daily β theory notes, practical labs, CTF writeups, and tool usage.
| Section | Topics | Status |
|---|---|---|
| π‘ Networking | OSI, Switches, Routers, DNS, Firewalls, HTTP, TCP/UDP | β Theory + Practicals Complete |
| π§ Linux | OverTheWire Bandit Wargames (15/34) | π In Progress |
| π΅ SOC / Blue Team | SOC fundamentals, SIEM, TryHackMe SOC Level 1 | π In Progress |
| π΄ CTF Writeups | PicoCTF, Hack The Box | β³ Coming Soon |
| π§ Tools | Splunk, Nmap, Burp Suite, Metasploit | β³ Coming Soon |
Cybersecurity tools I am learning:
Networking Theory ββββββββββββββββββββ 100% β
Networking Practice ββββββββββββββββββββ 100% β
Linux (Bandit) ββββββββββββββββββββ 44% π
SOC / Blue Team ββββββββββββββββββββ 20% π
CTF Competitions ββββββββββββββββββββ 0% β³
Tools & Practice ββββββββββββββββββββ 15% π
Click to expand β 16 attacks learned so far
| Attack | Layer | Category |
|---|---|---|
| MAC Flooding (CAM Table Overflow) | Layer 2 | Network Attack |
| MAC Spoofing | Layer 2 | Impersonation |
| ARP Poisoning | Layer 2/3 | MITM Setup |
| IP Spoofing | Layer 3 | Identity Forgery |
| BGP Hijacking | Layer 3 | Routing Attack |
| DNS Spoofing | Application | Redirection |
| DNS Cache Poisoning | Application | Redirection |
| DNS Tunneling | Multi-layer | Data Exfiltration |
| DNS Amplification | Application | DDoS |
| Man-in-the-Middle (MITM) | Application | Interception |
| Session Hijacking | Application | Impersonation |
| SSL Stripping | Application | Downgrade Attack |
| Clickjacking | Application | UI Deception |
| SYN Flood | Transport | DoS |
| UDP Flood | Transport | DoS |
| Phishing + C2 Bypass | Multi-layer | Firewall Bypass |
π‘ Open to guidance, mentorship, and advice from experienced professionals. I am a beginner actively learning β any feedback is always welcome!
"Every expert was once a beginner. This profile is proof that I showed up today."
