$ whoami

Kanishk Sharma

engineering_student | cybersecurity | devops

I learn by breaking systems, fixing them, and documenting the process. Currently focused on Linux, networking, cybersecurity fundamentals, and DevOps workflows. This website is my terminal — logs, notes, experiments, and progress.

cat blog/* ls projects/ git clone github

$ cat skills.txt

learning in progress

Cybersecurity

  • • OWASP basics
  • • Network security
  • • CTF fundamentals
  • • Penetration testing basics

Linux & Systems

  • • Bash scripting & CLI
  • • Permissions & users
  • • Server administration
  • • File systems

DevOps

  • • Git & version control
  • • Docker basics
  • • SSH & deployment
  • • CI/CD concepts

Networking

  • • TCP/IP protocols
  • • DNS & routing
  • • Firewall configuration
  • • Network troubleshooting

Programming

  • • Python scripting
  • • Java fundamentals
  • • Shell scripting
  • • SQL basics

System Fundamentals

  • • Operating systems
  • • Computer architecture
  • • Memory management
  • • Process concepts

$ ls -la projects/

learning experiments & builds

kanishksharma.blog

Custom technical blog built from scratch. HTML/CSS frontend with WordPress backend for content management.

HTML/CSS WordPress PHP
→ learned: web hosting, DNS, server deployment

network_scanner.py

Python script for scanning local networks, discovering active devices, and checking open ports.

Python Networking Sockets
→ learned: network protocols, socket programming

linux_server_setup

Configured Linux server with SSH hardening, firewall rules, and basic security measures.

Linux Security iptables
→ learned: server hardening, SSH keys, firewall config

$ cat blog/recent/*

writeups, notes, experiments

2024-12-10

Understanding Linux File Permissions

Breaking down chmod, chown, and why file permissions matter for security. A beginner's practical guide.

linux

2024-12-05

My First CTF Challenge Writeup

Documenting my approach to solving a basic capture-the-flag challenge. What worked, what didn't.

cybersecurity

2024-11-28

Setting Up SSH Keys on Linux

Step-by-step guide to generating SSH keys and configuring passwordless authentication for servers.

devops