Software engineering learner documenting my journey across Java, backend development, DSA, and cybersecurity. I write beginner-friendly explanations, practical notes, and lessons learned while building and analyzing real-world systems.
Nothing here yet.
Mar 23 · 6 min read · In Part 1, I followed a packet from my browser to a server.In Part 2, I understood where networks become vulnerable. Everything started making sense. But one question kept bothering me: How do attacke
Join discussion