How I'm Becoming an Ethical Hacker With No Degree — My Honest Roadmap
How I'm Becoming an Ethical Hacker With No Degree — My Honest Roadmap, Progress, and What Nobody Tells You
About eight months ago I made a decision that still feels slightly irrational when I explain it to relatives: I am pursuing a career in ethical hacking. Not cybersecurity broadly — specifically the offensive side, the part where companies pay you to try to break their systems before someone criminal does it first.
I'm an MCA student from Kerala. My academic background is computer science — I came to MCA from a computer application stream. I have no IT job experience. No prestigious college name. No family connections in the technology industry. What I have is a basic laptop, a reliable internet connection, and enough stubbornness to have spent the better part of a year on this.
This post is not a generic "here's how to become an ethical hacker" guide. There are hundreds of those. This is my actual journey — what I tried, what failed, what surprised me, and where I am right now. I'm writing it partly because I wish something like it existed when I started, and partly because documenting the process publicly keeps me accountable to continuing it.
- Why I chose ethical hacking — and the moment that made it concrete
- What ethical hackers actually do (what I learned vs what I imagined)
- The legal line — I almost made a serious mistake here
- The 5 skills I'm building and how far I've gotten in each
- My step-by-step roadmap — what I've done and what's next
- Certifications honest comparison — what I actually think about CEH vs OSCP
- Tools I use every week in my home lab
- The 6-month plan (my actual plan with current progress)
- What I'd tell someone starting today
Why I Chose Ethical Hacking — And the Moment That Made It Concrete
The honest version of why I got into this: I watched a YouTube video of someone rooting a HackTheBox machine at 1am during exam week when I should have been studying for something else entirely. The person found a misconfigured service, got a shell, escalated privileges, and captured the root flag — narrating the thought process the entire time. I watched it twice. Then I opened TryHackMe, created a free account, and did the first room instead of studying for my exam.
I passed the exam anyway. But something had shifted. I'd been vaguely interested in "cybersecurity" as a career idea — everyone in tech has heard that it pays well and there are too few professionals. But watching someone methodically think through a problem, try something, fail, adjust, and eventually break through — that felt like something I wanted to actually do, not just something I wanted to have done to me as a career milestone.
What made it feel possible rather than just appealing: everything I needed was free and available immediately. TryHackMe had guided rooms I could start on a basic laptop, right now, for nothing. PortSwigger Web Security Academy was a complete curriculum for learning web security, built by the people who made the most widely used web testing tool, completely free. The resources existed. The only variable was whether I would show up consistently enough to use them.
Eight months later I've passed CompTIA Security+, have six valid bug bounty findings on HackerOne, rooted 14 machines across TryHackMe and HackTheBox, and am writing this blog as documentation of the process. I'm still very much in the middle of this journey — not at the destination. But I'm further along than I believed was possible when I started, and I want to document exactly how I got here.
What Ethical Hackers Actually Do — What I Learned vs What I Imagined
Before I started, my mental model of ethical hacking came from YouTube videos and movies — rapid-fire terminal commands, dramatic moments, immediate results. The reality is more like careful detective work with significant documentation responsibilities at the end.
I thought ethical hacking was mostly about executing clever attacks. It's actually mostly about systematic methodology — thorough reconnaissance, patient enumeration, understanding how an application works before trying to break it, and documenting findings clearly enough that a non-technical person can understand the risk.
I also thought the exciting part was the exploitation. It is exciting — but exploitation is maybe 20% of the time spent on a real assessment. Reconnaissance and enumeration are 50-60%. Report writing is 20-30%. The skills that make someone genuinely good at this job are patience and systematic thinking as much as technical knowledge.
Knowing this going in would have changed how I practised. I would have spent more time on methodology documentation from the start, not just getting shells.
The actual day-to-day of an ethical hacker varies by role. A consultant at a security firm runs structured client engagements — defined scope, methodology, written report delivered to the client. A bug bounty hunter works independently on their own schedule. A red teamer runs long-form adversary simulations against a company's own defences. What's consistent across all of them: you are attacking systems with explicit permission, finding vulnerabilities before real attackers do, and communicating what you found clearly enough that it gets fixed.
The Legal Line — I Almost Made a Serious Mistake
Three months into studying, I was feeling confident. I had rooted several TryHackMe machines and completed most of PortSwigger's Apprentice labs. I was doing Nmap scans in my home lab and getting comfortable with the tool. One afternoon I ran an Nmap scan that included an IP range that was slightly broader than my home lab's subnet — I didn't fully verify the target range before running it.
The scan completed. Some of the IPs that responded were not my own machines. I had scanned addresses that were outside my own network — ISP infrastructure, based on what I could later figure out. Nothing bad happened. I didn't exploit anything. I stopped immediately when I realised what I'd done. But it was a genuine mistake made from carelessness, not malice — and in a different context with different targets, the same carelessness could have had real legal consequences.
That incident made me take the legal framework much more seriously than I had been. I spent the following week reading about the Computer Fraud and Abuse Act, India's IT Act, and how penetration testing engagement contracts work specifically to define legal authorisation. The legal knowledge is not optional. It is part of the job.
Where legal ethical hacking practice happens:
- TryHackMe and HackTheBox: Isolated virtual machines you are explicitly authorised to attack. All beginner practice should happen here
- Free cybersecurity learning From scratch to pro security analyst complete learning guide for how I built mine for ₹0
- Bug bounty programmes: HackerOne and Bugcrowd publish explicit scope — the domains you are authorised to test. Testing outside scope is not covered by the programme
- Signed penetration testing contracts: The legal instrument that makes professional assessments lawful
The 5 Skills I'm Building — Honest Progress on Each
Ethical hacking draws on five core skill areas. Here's where I actually am in each — not where a guide would tell you to be, but where I genuinely am right now after eight months:
Networking — Solid foundation, still gaps in Active Directory
My MCA curriculum covered TCP/IP, routing, DNS, and subnetting reasonably well. TryHackMe's Pre-Security path filled in the practical application knowledge. I'm comfortable with Nmap, Wireshark at a basic level, and understanding what different ports and services mean when I see them in a scan.
The gap: Active Directory. Corporate penetration testing relies heavily on AD attack techniques — Kerberoasting, Pass-the-Hash, BloodHound, lateral movement through Windows environments. My AD knowledge is conceptual rather than practical. I haven't set up a Windows Server lab yet, which I know is the next thing I need to do. It keeps getting delayed because Linux-based labs are more immediately accessible.
Start networking with TryHackMe Pre-Security path. It teaches you what you need in a practical context without the abstraction of a textbook. Don't delay the Active Directory work the way I did — corporate pentesting without AD knowledge is significantly limited.
Web Application Security — My strongest area, where I spend most time
This is where I've invested the most effort and where my practical skills are strongest. I've completed PortSwigger's full Apprentice curriculum and significant portions of Practitioner level. I've found real IDOR and business logic vulnerabilities on HackerOne. I use Burp Suite comfortably for most web testing tasks.
Writing this blog has deepened this knowledge more than I expected. When you have to explain SQL injection clearly enough for a complete beginner to understand it, you discover the gaps in your own understanding very quickly. The guides on this blog for SQL injection, XSS, CSRF, SSRF, and IDOR are each the result of me learning the topic thoroughly enough to explain it, not just execute it in a lab.
PortSwigger Academy is genuinely the best free resource for this. Not because someone told me it was — because I've used it extensively and nothing else I've found comes close to the combination of quality explanation and immediately applicable lab practice. Complete every Apprentice lab before moving to Practitioner. The difficulty jump is real.
Linux and OS Security — Comfortable for labs, needs improvement for real engagements
I daily-drive Ubuntu and run Kali Linux in VirtualBox for lab work. Terminal navigation, file permissions, process management, basic bash scripting — all comfortable. OverTheWire Bandit was the most time-efficient way I found to build Linux command-line fluency; each level teaches a real skill in context.
The gap here is privilege escalation — specifically the manual enumeration process on an unfamiliar system. I know the common privilege escalation vectors conceptually (SUID binaries, sudo misconfiguration, cron jobs, weak credentials) but I haven't practised them systematically enough to be reliable without hints.
TryHackMe's Linux PrivEsc room followed by dedicated VulnHub machines focused on priv esc. The gap between knowing the techniques and being able to find the vector on an unfamiliar machine requires repetition, not more reading.
Python and Scripting — Basic, improving
I can write Python scripts to automate HTTP requests, parse responses, and implement simple security tools. I've written a basic IDOR testing script and a subdomain enumeration helper. I cannot write complex exploitation code from scratch. I can read and modify existing Python tools, which covers most of what a junior ethical hacker needs.
The honest assessment: Python has been the skill area I've invested least time in relative to its importance. Every time I've chosen between more lab time and more Python study, I've chosen the lab. The result is a skill set that's stronger in application than in code quality.
Automate the Boring Stuff with Python (free online) for foundational Python. Then the Python API security testing guide on this blog for security-specific application. The combination took me from zero Python to useful-in-security-contexts in about six weeks of consistent evening practice.
Methodology and Reporting — Better than average for my stage
Writing this blog forced me to develop structured explanation skills earlier than most people at my stage. Every blog post requires me to understand a topic thoroughly, organise it logically, and communicate it clearly. These same skills are what professional penetration testing reports require.
I've also read approximately 80 disclosed HackerOne reports, which taught me how experienced researchers structure their findings — the description, reproduction steps, impact analysis, and remediation recommendation. My own bug bounty reports have improved significantly as a result of that reading.
Read disclosed security reports before you try to write them. HackerOne's hacktivity feed is a free library of professionally written vulnerability reports. Spending two weeks reading these before writing your first report will make your reports meaningfully better from the start.
My Step-by-Step Roadmap — What I've Done and What's Next
Building Foundations — Networking, Linux, Web Basics
Months 1–2The foundation phase. Everything I did here was free. The goal: understand how networks communicate, how Linux works in a terminal, and how web applications function — before touching any exploitation tools.
- TryHackMe Pre-Security path (free): Networking basics, Linux fundamentals, web fundamentals. Browser-based — no setup required. This was my starting point and genuinely the right one.
- OverTheWire Bandit (free): Linux command-line skill building through a wargame. Completed levels 1–20. Each level teaches a real skill — grep, SSH, file permissions, environment variables. More educational per hour than reading documentation.
- Read the foundation guides on this blog: What is Cybersecurity, How Hackers Find Vulnerabilities. Reading these as I was studying helped connect the abstract concepts to practical context.
Web Application Security — PortSwigger and Burp Suite
Months 2–4The phase where I found my specialisation. Web application security is the most accessible, highest-demand area for beginners — all the practice runs in a browser, the resources are excellent and free, and the skills directly translate to bug bounty work.
- PortSwigger Web Security Academy (100% free): The single most valuable resource I've used. Completed all Apprentice labs across Server-Side and Client-Side topics. Currently working through Practitioner level SQL injection and XSS. Every lab teaches something that generic tutorials don't cover.
- Burp Suite Community Edition (free): Installed and use it for every PortSwigger lab. The proxy intercept, Repeater, and Intruder tools are now second nature. Learning a tool by actually using it on structured labs is vastly more effective than watching tool tutorial videos.
- Blog guides alongside labs: I write a blog guide for every major vulnerability type I study — SQL Injection, XSS, CSRF. Writing the guide exposes every gap in my understanding of that topic.
Network Penetration Testing — Nmap, Metasploit, and HackTheBox
Months 3–5Expanding from web applications to full network penetration testing methodology. This is where the home lab became essential — running Metasploitable 2 and VulnHub machines against Kali Linux taught me things that guided labs can't replicate.
- TryHackMe Jr Penetration Tester path: Structured guide through reconnaissance, scanning, exploitation, post-exploitation, and reporting. Completed this path and it gave me the methodology framework I was missing.
- Nmap deep dive: Host discovery, port scanning, service enumeration, NSE scripts. The TryHackMe Nmap room is well-structured. I also read the Nmap documentation specifically for NSE script usage — more powerful than most beginners realise.
- Metasploit Framework: Completed TryHackMe Metasploit room. Then practiced on Metasploitable 2 in my home lab. The experience of running an exploit against a real (intentionally vulnerable) service rather than a guided lab is qualitatively different.
- HackTheBox Starting Point: First three Starting Point machines. These are significantly harder than TryHackMe rooms and required looking up approaches I hadn't encountered. Read writeups only after genuinely attempting each machine for at least 2 hours.
Certification and Portfolio Building
Months 5–6Translating skills into verifiable credentials and a public portfolio that employers can evaluate. This is where the abstract work becomes something concrete I can show.
- CompTIA Security+ — passed (782/900): Studied with Professor Messer's free videos, Jason Dion's practice exams, and Splunk Fundamentals for the SIEM section. Full study experience documented in my Security+ personal guide.
- GitHub portfolio: Public repositories documenting lab methodology, CTF writeups, and security tool scripts. Every significant piece of work goes here with a proper README.
- This blog: 40+ published articles covering every major web security topic, career guides, and personal experience posts. Two interviewers have specifically mentioned the blog as the reason they agreed to a call.
First Role and the Path to OSCP — What I'm Working Toward
Month 6 and beyondI am currently in the active job application phase — 40 applications submitted with 11 responses and 3 technical interview progressions. That experience is documented fully in my job applications guide. The OSCP is the target after landing a first role.
- Target roles right now: Junior Penetration Tester, SOC Analyst with testing responsibilities, Security Analyst at small consultancies. Applying to smaller companies first — they hire freshers more readily than large MNCs.
- eJPT: Planning to take the eJPT practical exam within the next 60 days. A practical certification that proves I can conduct a basic assessment, not just pass a multiple-choice test.
- OSCP — the long-term target: The gold standard for penetration testers. Not taking it yet — it requires more experience than I currently have, and the $1,499 cost means employer reimbursement after a first role makes financial sense. Building toward it while working is the realistic path.
- Active Directory lab setup: My most significant current skill gap. Need to build a Windows Server + Active Directory lab to practice the attack techniques that dominate corporate pentesting engagements.
Certifications — My Honest Opinion on CEH vs OSCP vs the Rest
I've researched certifications extensively while planning my own path. Here is what I actually think, not what cert vendors want me to think:
The box that must be checked. Required by many job descriptions, satisfies DoD 8570 requirements for US government roles. Theory-heavy but comprehensive.
EC-Council's certification. Recognised in corporate HR but not respected by technical hiring managers at actual security companies. Expensive for what it provides.
Practical exam — you hack a real network. Proves actual skill at a price that makes sense for a student. The certification I'm taking next.
The gold standard. 24-hour practical exam. Opens senior pentesting roles. Not for beginners — get here after 1-2 years of experience and real-world practice.
Tools I Use Every Week in My Home Lab
My 6-Month Plan — With Current Real Status
Where I Am in the 6-Month Roadmap
Foundations: Networking + Linux
TryHackMe Pre-Security path, OverTheWire Bandit levels 1–20, foundation guides. Comfortable in terminal, understand TCP/IP, HTTP, DNS.
✓ CompleteWeb Security: PortSwigger Apprentice
Completed all Apprentice labs, SQL injection and authentication sections in depth. Installed and learned Burp Suite. Wrote first blog guides.
✓ CompleteNetwork Pentesting + Home Lab + First HTB Machines
TryHackMe Jr Pen Tester path complete. Home lab built (Kali + Metasploitable + DVWA). 14 machines rooted across TryHackMe, HTB Starting Point, and VulnHub. First 3 HackerOne reports submitted (all duplicates — documented in bug bounty guide).
✓ CompleteCompTIA Security+ + First Valid Bug Bounty Findings
Passed Security+ SY0-701 with 782/900. Six valid HackerOne findings including two Medium IDOR vulnerabilities. LinkedIn profile updated. GitHub portfolio active with 12 documented writeups.
✓ CompleteJob Applications + eJPT Prep + AD Lab Setup
40 applications submitted, 11 responses, 3 technical interviews. eJPT exam scheduled. Active Directory lab build started. Continuing PortSwigger Practitioner labs and bug bounty work.
⟳ Currently in progressFirst Security Role + OSCP Foundation Building
Land first security role (SOC Analyst or Junior Pen Tester at a small consultancy). Begin formal OSCP preparation. Continue blog and bug bounty work.
UpcomingWhat I'd Tell Someone Starting Today
If I could go back to eight months ago and give myself advice, it would be these five things:
- Start with TryHackMe Pre-Security, not YouTube hacking tutorials. The tutorials are exciting but they teach you to follow steps without understanding them. Pre-Security builds the models that make everything else learnable.
- Build something public from day one. A GitHub, a blog, a TryHackMe public profile. The work you do privately compounds in your head. The work you document publicly compounds in your career. Both matter, but only one is visible to employers.
- The boring parts are the important parts. Methodology, documentation, report writing, legal frameworks — these feel less exciting than exploitation techniques. They are more important for a career. I learned this later than I should have.
- Use AI tools as a tutor, not an answer machine. I wrote about this in detail in my AI tools guide. The short version: use AI to understand what you're stuck on, then go back and solve it yourself. The struggle is the learning.
- The timeline is longer than the YouTube videos suggest. Six months from zero to job-ready is achievable. One month is not. Anyone telling you otherwise is selling something. Consistent effort over a realistic timeline is the path — not a shortcut that doesn't exist.
Comments
Post a Comment