Exploring Ethical Hacking: The Journey of Daniel Svoboda aka BY7E.NET

Exploring Ethical Hacking: The Journey of Daniel Svoboda aka BY7E.NET

Daniel Svoboda, known as BY7E.NET, shares his journey into ethical hacking on MyHackerTech. From a childhood fascination with computers to his current role as a Red Teamer, Daniel’s story is fueled by relentless curiosity and passion. Starting in the early 2000s with VB scripts, Delphi, and tools on platforms like Yahoo and IRC, he transitioned from exploring the grey areas of hacking to ethical hacking—using his skills to protect rather than exploit. 

A pivotal shift to Linux distributions like BackTrack expanded his expertise, leading to a career excelling in Python, Bash, and advanced exploitation frameworks. Daniel’s journey highlights cybersecurity’s dynamic nature and offers valuable skills, resources, and insights for anyone pursuing ethical hacking. This blog delivers a fresh perspective on the challenges and rewards of this ever-evolving field.

 

Your Path to Ethical Hacking: Can you share what initially sparked your interest in cybersecurity and how it led to your career as an ethical hacker?

 
My name is Daniel Svoboda, you might know me as BY7E.NET. I’m thrilled to have the chance to share my journey into the world of ethical hacking. This field has been a passion of mine for years, and I’m incredibly grateful for this opportunity.
 
I've always been intrigued with computers, building them and running them. Curiosity keeps me driving forward, learning new things every day. The more I got into hacking and security, the more addicting and captivating it became. I’ve found that I’m most engaged when I’m hacking. Getting locked in on the terminals and obtaining shells, that’s my zone!
 
My early days were spent exploring the grey areas of hacking, purely out of a desire to learn. I experimented with tools, played around with different techniques, and learned by doing. These experiences laid a solid foundation of practical knowledge. But as I delved deeper, I realized the immense responsibility that came with these skills. I made the conscious decision to channel my abilities towards ethical hacking, to protect rather than exploit.
 
How it all started — It was early 2000s, back when Yahoo and IRC were at their peak. I spent long hours on the computer, day in and day out, running the channels on IRC and never really getting much sleep. I met some great people along the way who I am still friends with today. I was back and forth on Yahoo and IRC simultaneously for a span of nine years, just constantly learning and doing.
 
During this time, I learned to code VB scripts (Visual Basic) and Delphi with some friends. We collaborated on projects that enabled me to understand how things work and break, to adapt my skills further. From sniffing packets in Wireshark to crafting tools, finding vulnerabilities, and then eventually having a PoC. I explored much of the web application landscape back then. Over time, I progressed to developing more advanced tools, eventually I dabbled in some Delphi, but after a while, I grew tired of Windows OS and decided it was time to get more serious.
 
That’s when I made the switch to Linux distributions like BackTrack, WHAX, and Knoppix (at the time). This shift marked a pivotal moment for me as I embraced the open-source environment and the broader world of ethical hacking. Fast forward 14 years, armed with Python and Bash skills from university courses and learning and doing.
I’m nearing the completion of my bachelor’s degree in computer information security (set to graduate with honors in 2025 as a top-ranked student on the dean’s list). Along the way, I’ve filled in gaps in my self-taught knowledge by maintaining a consistent practice of learning and hands-on applications.
As a Red Teamer, I thrive on the challenge of breaking down complex systems and networks to identify and exploit vulnerabilities. The process of analysis and discovery sharpens my skills and keeps me ahead of the curve. With each engagement, there’s an opportunity to uncover something new and exciting, and that relentless pursuit of growth and innovation is what drives me forward.  Cybersecurity is an ever-evolving field that serves as a critical pillar of our digital infrastructure, where security is paramount to protecting networks, systems and sensitive data from threat actors.
 

The Appeal of Hacking and Security: What aspects of hacking and security set them apart from other areas in IT for you? What keeps you intrigued and motivated in this field?

What sets hacking and security apart from other areas in IT for me is the dynamic and adversarial nature of the field. Unlike traditional IT roles focused on maintenance and support, offensive security challenges me to think creatively and strategically, to see systems not just as they are, but as they could be exploited. Every environment is unique, and every engagement is a puzzle that requires deep technical knowledge, adaptability, and having a mindset in an offsec perspective.
 
What keeps me intrigued is the constant evolution of attack vectors, tools, and defenses. No two days are the same, and there’s always a new exploit, technique, or technology to master. The process of recon, exploitation, and post-exploitation analysis is a mental game of cat and mouse that never loses its thrill. I’m driven by the opportunity to stay ahead of adversaries, discover unknown vulnerabilities, and ultimately help organizations become more secure. Knowing that my work strengthens the overall security landscape gives me a profound sense of purpose.
 

Essential Skills for Cybersecurity: In your opinion, what are the key skills that are crucial for success as a cybersecurity professional, particularly in the area you are specializing in?

Success as a Red Teamer requires a blend of technical, analytical, and interpersonal skills. At the core, technical proficiency is non-negotiable. This includes a deep understanding of network operations, system architecture, and protocols, as well as fluency in scripting languages like Python and Bash. The ability to develop custom tools when needed is essential, and familiarity with exploitation frameworks like Metasploit.
 
Adversarial mindset is another key skill. thinking like an attacker, spotting gaps and edge cases that defenders might overlook. This means leveraging creative problem-solving and maintaining an offensive mindset to outmaneuver evolving security measures. Scoping out attack vectors and finding ways to break in before malicious threat actors.
 
Continuous learning is vital since new exploits, vulnerabilities, and attack techniques emerge constantly. Staying ahead of threat actors means dedicating time to research, reverse engineer malware, code review, and hands-on experimentation in lab environments is crucial to staying in tune with current trends and attacks.
 
Reconnaissance and OSINT skills are very critical in the early stages of ethical hacking. The ability to extract valuable information from public and internal sources sets the stage for successful exploitation.
 
Finally, communication and reporting skills are often overlooked but just as critical. It’s one thing to exploit a vulnerability, but it’s another to clearly explain the impact to stakeholders, especially non-technical ones. As a Red Teamer, you must be able to articulate technical findings in a way that drives change and strengthens an organization’s security posture.
 
These skills, when combined, allow me to approach every engagement with precision, adaptability, and an insatiable drive to find and report vulnerabilities before adversaries can exploit them.
 

Recommended Learning Resources: Are there specific resources—such as courses, certifications, blogs, or forums—that have been particularly helpful in your own learning journey and that you’d recommend to others?

Books
This book dives deep into advanced security testing techniques using Kali Linux. It covers a wide range of topics, including AV bypass, web application penetration testing, IoT device security, and more. It's designed for both beginners and experienced professionals looking to enhance their penetration testing skills.
This book focuses on exploring various Command and Control (C2) frameworks using Kali Linux. It covers frameworks like Sliver, Empire, StarKiller, Covenant, and many others. The book provides hands-on tutorials and practical insights into obtaining remote shells, executing commands on target systems, and navigating the complex terrain of C2 frameworks.
Both books are highly recommended for anyone looking to deepen their knowledge and skills in ethical hacking and red teaming. They are available on Amazon.
The Web Application Hacker's Handbook -- Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto is a comprehensive guide for anyone interested in web application security.
 
Platforms
TryHackMe > Beginner-friendly, hands-on labs to build Red Team/ethical hacking skills.
Hack The Box (HTB) > Advanced, real-world-style challenges that simulate Red Team engagements. Highly regarded CTF platform--HTB also offers some nice certs that I am fixing to get into myself.
INE and Offensive Security Labs > Excellent for OSCP and CRTO exam preparation, offering hands-on learning in environments similar to live networks.
ZeroPointSecurity’s "Red Team Ops" > One of the best courses for understanding adversary tactics, techniques, and procedures (TTPs) with Cobalt Strike. Currently looking into this one.
Forums and Communities
Reddit (r/NetSec, r/HowToHack, r/OSINT) > Valuable for staying up to date with the latest tactics, tools, and industry news.
Discord Servers (like TheCyberMentor’s TCM Discord) > Great for networking, sharing resources, and getting real-time advice from industry pros.
Cybersecurity Conferences > DEF CON, Black Hat, and BSides are essential for live demos of new tools, zero-day discussions, and Red Team community connections.
Blogs and Websites
OWASP Community > Offers insights on web application vulnerabilities. OWASP Top 10/ Directory VWAD.
TrustedSec and SpecterOps blogs > They share high-quality Red Team insights, post-exploitation techniques, and tool releases.
PortSwigger Blog > Offers guidance on web vulnerabilities like XSS, SQLi, and more, which often feature in Red Team engagements.
HackerOne and Bugcrowd Writeups > Reviewing bug bounty reports is a great way to see real-world exploitation examples.

Personal Approach

Lab Environments > I build personal labs to run VMs, and cloud instances to simulate environments. This hands-on approach allows me to test new TTPs and refine my Red Team methodology.
Scripting Practice > Writing custom Python and Bash scripts to automate reconnaissance and exploit development is invaluable for developing technical fluency. Consistency and discipline are essential for continuous growth in this skillset.
 
These resources have not only sharpened my hacking skills but have also transformed my mindset to think like an adversary. I highly recommend combining theoretical knowledge, hands-on practice, active participation in like-minded communities, sharing information and insights. This blend is essential for accelerating growth and becoming proficient in this field.
 
Tip > Unauthorized hacking is illegal and subject to severe legal consequences. Ethical hacking, conducted with explicit permission, plays a vital role in strengthening cybersecurity. Always obtain proper authorization before engaging in such activities.
 
Instagram   > @b_y_7_e
Email            > BY7E@yahoo.com

Leave a comment

Please note, comments must be approved before they are published

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.