100 Days Of Rust 2025 : From Incident Response To Linux System Programming

In 2025 I wanted to try something new. In addition to a traditional 100 days of Yara, I will also be doing 100 days of Rust. For some time it has been my goal to learn Rust, but I’ve never had enough time for it.

I think 100 days challenge is a pretty good format to learn something new, as it doesn’t take a lot of time from your day to accomplish one simple task but accumulated gains from many days doing it consistently are big.

In a way this is kind of similar to the endurance sports training (which, for those who don’t know me is also one of my passions).

Goal

As “learn Rust” is a pretty vague goal, I decided to focus on a more specific goal of learning Rust for Linux system programming. Therefore, most of the challenges I will undertake in the next 100 days will focus on this specific aspect.

My Background

I am by no means a Software Engineer, I am an Incident Responder, turned Malware Analyst, turned CTI analyst and have a limited experience with programming.

I mostly use Python in my everyday tasks, but have some knowledge of C and JavaScript as well. I will probably do some references to Python in these notes, as this is a language I feel most comfortable with.

Days

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

3 weeks ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 month ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

1 month ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

1 month ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

1 month ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 month ago