NullToKnown logo

NullToKnown

Cybersecurity Journey

Blog

From Null to Known: Crossover Cables, Cheat Engine, and a Plot Twist

2026-02-23

learning-logorigin-storycareer-shiftcybersecurity
From Null to Known: Crossover Cables, Cheat Engine, and a Plot Twist

I did not start in cybersecurity with a polished roadmap.

I started with two old desktop PCs, one crossover cable, and a lot of trial and error.

Phase 1: Two PCs, dial-up, and chaos

In primary school, I tried to run a tiny two-PC internet cafe at home.

Friends paid a small fee to play online games. Dial-up made the usual alien noises in the background.

I learned from forums like pc-experts, then tested everything myself.

I also fried a desktop while overclocking and swapping parts.

The PC died. The curiosity stayed.

Phase 2: Linux and the terminal pull

Then I found Linux.

I did not understand much at first, but I was hooked by the terminal and how fast experts moved with it.

So I focused on fundamentals:

  • Building and fixing PCs
  • Installing and reinstalling operating systems
  • Learning how systems behave when they break

Phase 3: My first security practice came from game cheating

This part is honest.

My first security-related experiments were game memory edits with Cheat Engine and hex tweaks.

At the time, I did not see it as security work. I later learned it overlaps with reverse engineering thinking.

Phase 4: University and first IT job

I studied Electronics and Communications Engineering, not computer science.

Still, I kept joining Linux workshops and practical tech sessions.

That preparation helped me land my first role as a Desktop Support Engineer.

Phase 5: IT operations, networking, and CCNA

Support work taught me real production constraints.

I learned from incidents, patch cycles, user issues, and systems that fail in messy ways.

I studied networking seriously, completed CCNA, and built stronger foundations.

Phase 6: The pentest moment

At PropertyGuru, I shadowed an external pentester while handling sysadmin and network work.

pentester

Seeing attack paths chained from small weaknesses changed how I viewed security.

It was methodical and practical, not movie hacking.

Phase 7: DevOps detour, then return to security

As responsibilities grew, I focused on cloud, platform, and DevOps delivery.

Security moved to the background for a while.

Now I am returning with more structure and better goals through the HTB CJCA path.

If you want the timeline view, check my projects.

Why this blog exists

This is my working portfolio.

You will see:

  • Home lab builds
  • Sanitized HTB and THM notes
  • Practical security projects
  • What worked, what failed, and what I changed

If you are switching into cybersecurity, this journey will show the real process, not only polished wins.