How It Started

I got into video games at age 6 with classics like Crash Bandicoot, Lemmings, and Spyro. At 25 now, I still love games when I get the chance - recently Tears of the Kingdom and various ghost hunter games, though my current computer limits how much I can play. But what really hooked me from the beginning wasn't just playing - it was finding exploits and glitches. There was something satisfying about discovering ways the game wasn't supposed to work, understanding the mechanics behind the magic.

This naturally led me toward game development. If I could break games, maybe I could build them. I'd work on projects for 8 hours straight, completely absorbed in the problem-solving. The challenge? My ADHD meant that once I saved and quit, I'd start a completely new project rather than continue the old one. Dozens of half-finished games, but each one taught me something new about how systems work.

The Physical World

Somewhere along the way, I discovered lockpicking. I can't pinpoint exactly what drew me to it, but the appeal was immediate - here was a physical system with rules, mechanisms, and vulnerabilities you could understand through practice and patience.

Started with a basic set from an online marketplace, then upgraded to the Echelon set from Covert Instruments as I got more serious about understanding different lock types and picking techniques.

The Connection

Lockpicking taught me that physical security follows the same principles as digital systems - there are always assumptions, shortcuts, and edge cases that can be exploited if you understand how they work.

Back to Digital

Physical security work got me thinking about digital systems again, but from a security perspective this time. I set up a Kali VM to start learning digital pentesting, but running it on Windows was frustrating and slow.

So I did what felt natural - wiped my laptop completely and flashed Kali directly onto the hardware. No dual boot, no safety net. It's been my daily driver ever since, and I use it for digital training on platforms like TryHackMe. I'm not claiming to be an expert - I'm still learning - but the hands-on approach works for my learning style.

The Realisation

Listening to security podcasts, I started hearing stories about physical penetration testing and realised something: the mindset I'd been developing - always looking for ways systems could fail, thinking about edge cases, understanding mechanisms - this was exactly what physical pentesting required.

I naturally analyse vulnerabilities everywhere I go. The difference between what I do as a hobby and what professional pentesters do isn't the skillset - it's the context. I've never had anyone officially ask me to break into their building and provide documentation to fix it, but the systematic approach comes naturally.

The Why

If something can be broken into, it's better you hire someone to do it ethically and fix it than wait for someone to do it with malicious intent. Ethical testers care about not breaking windows, doors, or hurting people. Malicious actors don't.

Current Reality & Future Goals

Right now, I'm still working my 8-4 at the carwash. It pays the bills, but it's not where my life goals are. I want to turn these hobbies into profit, or better yet, passive income - earning from effort I put in once, not having to go back every day, every week, every year just to survive. That's not living life, that's just existing.

The carwash work isn't wasted though. Both jobs teach you the same thing: small problems, left unaddressed, become big ones. Whether it's a missed spot on a car or a security vulnerability in a building, attention to detail matters.

Game Exploits

Understanding how systems break and finding unintended behaviors

Physical Locks

Learning mechanical systems and bypass techniques

Digital Security

Applying physical security mindset to digital systems

Future: Professional Testing

Combining all skills for systematic security assessment

How I Think

I understand a lot of mechanisms and how things work. If I don't understand something, I play with it until I figure it out. I have strong intuition for systems, but like any button that's not meant to be pressed - if I don't know what it does and I play with enough buttons, I'm sure to break something eventually.

The key is understanding it so it either doesn't happen again, or it can be fixed more efficiently next time. Every failure is data. Every break is a learning opportunity. Every system has a logic to it, and once you understand that logic, you can predict where the weak points are.