<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Narasimha Mallegari</title>
    <description>The latest articles on Forem by Narasimha Mallegari (@narasimha_mallegari_).</description>
    <link>https://forem.com/narasimha_mallegari_</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3858681%2F8b3dfa04-548f-41a8-90cb-55c12dd968c7.jpg</url>
      <title>Forem: Narasimha Mallegari</title>
      <link>https://forem.com/narasimha_mallegari_</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/narasimha_mallegari_"/>
    <language>en</language>
    <item>
      <title>Learning Cybersecurity — I watched my own internet traffic, and it changed how I think about security</title>
      <dc:creator>Narasimha Mallegari</dc:creator>
      <pubDate>Sat, 04 Apr 2026 19:39:51 +0000</pubDate>
      <link>https://forem.com/narasimha_mallegari_/learning-cybersecurity-i-watched-my-own-internet-traffic-and-it-changed-how-i-think-about-security-2eda</link>
      <guid>https://forem.com/narasimha_mallegari_/learning-cybersecurity-i-watched-my-own-internet-traffic-and-it-changed-how-i-think-about-security-2eda</guid>
      <description>&lt;p&gt;I am documenting every day of my cybersecurity learning journey publicly. &lt;/p&gt;

&lt;h2&gt;
  
  
  What I did today
&lt;/h2&gt;

&lt;p&gt;Watched Professor Messer's TCP/IP video, installed Wireshark, completed my first TryHackMe room, and spent about two hours actually watching packets move through my own network.&lt;/p&gt;

&lt;h2&gt;
  
  
  The moment everything clicked
&lt;/h2&gt;

&lt;p&gt;I have read about TCP handshakes probably five times in the last week. SYN, SYN-ACK, ACK. I understood the words. I could repeat them back. But I did not really understand them.&lt;/p&gt;

&lt;p&gt;Today I opened Wireshark, started a capture, loaded a website, and watched it happen in real time on my own machine. My computer sent a SYN. The server replied SYN-ACK. My machine confirmed with ACK. Then the data started flowing.&lt;/p&gt;

&lt;p&gt;That is the moment the moment theory became real for me. It is three packets. It happens in milliseconds. And it happens every single time any device anywhere connects to any other device on the internet.&lt;/p&gt;

&lt;h2&gt;
  
  
  The HTTP experiment that honestly surprised me
&lt;/h2&gt;

&lt;p&gt;I set up a Wireshark filter for HTTP traffic and visited a website that does not use HTTPS — neverssl.com, which exists specifically for this kind of testing.&lt;/p&gt;

&lt;p&gt;I found one of the captured packets and clicked on it. In the lower panel of Wireshark, I could read my entire web request. Every header. The browser I was using. The page I requested. Everything.&lt;/p&gt;

&lt;p&gt;Plain text. Completely readable.&lt;/p&gt;

&lt;p&gt;I knew HTTPS was important before today. But seeing HTTP traffic readable in Wireshark made it real in a way that reading about it never did. If I were on public WiFi at a coffee shop using an HTTP website, anyone else on that network could run Wireshark and read exactly what I was sending. Logins. Session tokens. Everything.&lt;/p&gt;

&lt;p&gt;This is why security researchers talk about public WiFi being dangerous. It is not theoretical. You can literally watch it happen.&lt;/p&gt;

&lt;h2&gt;
  
  
  DNS — something I never thought about before
&lt;/h2&gt;

&lt;p&gt;When you type a website address into your browser, your computer does not magically know where to go. It sends a DNS query first — essentially asking "hey, what is the IP address for this domain name?"&lt;/p&gt;

&lt;p&gt;In Wireshark, I could see this happen before the page even started loading. The DNS query left my machine. A response came back with the IP address. Then the TCP connection to that IP started.&lt;/p&gt;

&lt;p&gt;Every website visit involves this. You just never see it unless you are looking at the raw traffic.&lt;/p&gt;

&lt;h2&gt;
  
  
  TryHackMe — first room done
&lt;/h2&gt;

&lt;p&gt;Completed the "What is Networking?" room on TryHackMe today. It covered what networks are, IP addresses, MAC addresses, and the basics of ping and ICMP.&lt;/p&gt;

&lt;p&gt;One thing I picked up that I did not know before: MAC addresses are hardware-level identifiers that cannot change, while IP addresses are assigned by the network and can change. So when a device connects to a new WiFi network, it gets a new IP — but its MAC address stays the same.&lt;/p&gt;

&lt;p&gt;That distinction matters in security because MAC addresses can be used to track devices even when they change IP addresses, and MAC spoofing (faking your MAC address) is a real attack technique.&lt;/p&gt;

&lt;h2&gt;
  
  
  Questions I left with today
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;How does a router decide the best path when there are multiple routes to a destination?&lt;/li&gt;
&lt;li&gt;What is inside a TLS certificate, and how does it prove a website is legitimate?&lt;/li&gt;
&lt;li&gt;If WiFi is encrypted, why is it still possible for attackers to intercept traffic?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These go on my list.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is on the plan for tomorrow
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Professor Messer Common Ports video — memorizing the standard port numbers&lt;/li&gt;
&lt;li&gt;First Nmap scan in Kali Linux on a legal test target&lt;/li&gt;
&lt;li&gt;TryHackMe OSI Model room&lt;/li&gt;
&lt;li&gt;DNS recon commands in terminal — nslookup, dig, host&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All my notes are on my GitHub. If you are also learning cybersecurity and want to compare notes, feel free to connect.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>networking</category>
      <category>network</category>
      <category>wireshark</category>
    </item>
  </channel>
</rss>
