Hack The Box: Cybersecurity Training
Popular Topics
  • JOIN NOW
ALL Red Teaming Blue Teaming Cyber Teams Education CISO Diaries Customer Stories Write-Ups CVE Explained News Career Stories Humans of HTB Attack Anatomy Artificial Intelligence

Career Stories

10 min read

From Marine Jarhead to Hacker, the Chuck Woolson Story

This is a great story of a person that changed careers in his 50's and became a hacker with little prior experience.

ippsec avatar

ippsec,
Jan 21
2022

Hack The Box Article

We came across Chuck Woolson a few months ago on LinkedIn

Loading Preview...

when he talked about his journey into InfoSec. Chuck was a United States Marine, a construction worker, and a professional driver over the span of 20 (ish) years and didn't have a large background in tech. Due to medical reasons, he was given the choice to either live on Medical Disability or find a new career. That’s when the Marine inside kicked into high gear and he decided to learn the dark arts of cybersecurity and become a hacker. He is now amongst the Red Team Operators for Synack Red Team (SRT).  


What type of work did you do as a "Jarhead" for the United States Marine Corps?

Before I answer, I’d like to say thank you for this opportunity. It’s an honor to share my experiences with ‘The GodFather of Hacking’!

I have done a lot of things in my life over the years, but being a United States Marine was the thing that shaped my life into what it is today. My MOS was 5811. (Military Police) Which in the Marines, that meant that I was a grunt with a badge. My unit handled the law enforcement responsibilities in the field while on deployment. Normal MP’s ride around the base with their little lights and sirens while blasting the theme song to “Cops” on their radios. My unit, however, were the armed personnel that rode around outside of the base in armored HUM-V’s ensuring that our convoys got from point A to point B safely.

What skill sets do you think you picked up from that past life that helped you become a Red Team Operator?

I was active duty for approximately 4 years, and in that time, I developed what I call a ‘Security Mindset’. I’ve always had a ‘Protector’ mentality. When I used to go out on patrols, I quickly learned how to ‘Keep my head on a swivel’. If something doesn’t look right, investigate it (or poke it with your K-Bar). Being the ‘Protector’ isn't always fun, there is a lot of sitting around and grunt work. The majority of the time you investigate something, it turns out to be nothing but you have to keep your head up and keep doing your best knowing it is all about finding that one time when it isn’t nothing. This is very much like hacking for every success I have, there were countless failures (or checks that did not pan out).

You mentioned you had zero experience prior to Hack The Box – How did you pick up foundational skills like how to use Linux/Script/etc?

I had an older Lenovo G780 with Windows 10. I put in a new hard drive and installed Kali Linux. I knew that I wanted to be a hacker. I also knew that the best way to learn was to get my hands dirty. Being a pentester is mostly a hands-on job, so yeah, learn by doing.

You mentioned you started off hacking HTB Machines alongside the videos, were there any favorite resources you used besides "google" to understand what you were seeing in the videos?

I really did jump into the deep end, watching hacking videos and researching everything I did not know. This has accumulated quite a few bookmarks over the past 2 ½ years or so, but my all time favorite go-to resources would have to be:

  • https://book.hacktricks.xyz/

    Loading Preview...

  • https://github.com/swisskyrepo/PayloadsAllTheThings

    Loading Preview...

  • https://ippsec.rocks/?#

    Loading Preview...

 

How did you choose what boxes to do when starting out on Hack The Box? 

I’ve never really been a super-organized person. So, when I started Hack The Box, I was flying by the seat of my pants. I started with the easiest ones. I think the first one was Traceback. I just kind of worked my way through the easy boxes in the retired machines. Since I didn’t know much, I stuck with the retired boxes so I could watch your video walkthroughs to learn.

What about now? How do you stay on top of the latest vulnerabilities?

Honestly, Twitter. I follow a lot of people in the bug bounty scene, I started out with just a few people, then looked at who they follow or interact with to get a much larger list. If I had to pick five people off the top of my head, the first that come to mind are:

  • @TheHackersNews

    Loading Preview...

  • @Stokfredrik

    Loading Preview...

  • @NahamSec

    Loading Preview...

  • @ippsec

    Loading Preview...

  • @PortSwigger

    Loading Preview...

When it came to taking the OSCP, did your methodology change after each exam attempt? 

I took the OSCP exam three times.

My first exam attempt, I was a bit cocky and thought I was Mr. Robot. My ego got the better of me and I only got a single user flag on the 20 point box. I was devastated after that and didn’t even bother writing a report, so my total score was 0. Having already finished the PWK Course, I was at a loss for what to do next, I thought for sure I was better than this. In reality, I just wasn’t at the point yet where I could identify what I don’t know, which meant I thought I knew everything… Just like on TV with Mr. Robot.

The next year I spent almost entirely doing Hack The Box machines, I even purchased Dante Pro Lab. I got really good and then I got an email from Offsec. They retired five exam machines and put them in the PWK Labs. I knew that I had to conquer them. They were quite a bit more difficult than I expected but I completed all five machines and felt that I was more ready than ever to give OSCP another go. 

I scheduled another attempt and after a couple hours I had already surpassed my previous record of just a single user flag.  I was feeling good and a part of me thought I was going to pass but I hit a wall. At the end of the exam I had totaled 65 points, just 5 points shy from passing. Unlike my first attempt, I was invigorated, I saw improvement and got incredibly close to passing. I remember thinking to myself “No Biggie, I’ll get it next time” and immediately scheduled the retake in 30 days.

The next 30 days were primarily spent finishing Dante and taking notes while I watched ippsec videos. I was having a lot of fun learning, the thirty days felt like a week and it was time for my 3rd attempt. Unlike before I felt calm and confident but not cocky. I knew there could always be a new curve ball that sends me back to the labs. However I have become so engulfed in solving these security puzzles, even if I passed, I would probably return to the labs shortly after. I remember getting the required 70 points to pass with plenty of time to spare, but I knew I’d never see these puzzles again so I stuck with it for another few hours.  Twenty three hours into the exam, I decided I was done because I had compromised every machine and achieved a perfect score 100/100.

Between the second and third attempt, I don’t think my methodology changed. Instead, my foundations just got stronger, which allowed the methodology I learned from Hack The Box to shine. By this I mean I had a better intuition at what the application was doing on the backend, which helped guide me at the tools to use. I finally understood this isn’t just a flowchart of “run this tool”, “see this” and “do that”. There’s a weird piece between “see this” and “do that”, where you have to read between the lines to get a feel of what to do next.

SynackSrt

How did you find out about the Synack Red Team?

I started Dante Pro Lab shortly after my first OSCP attempt. It took me a while to work through it. When I finally finished it, I saw that I was eligible to be Fast-tracked onto SRT. I had no earthly idea what SRT even was. I mean, when I was in the Corps, I had SRT (Special Reaction Team) training, but this was different. The name SRT really piqued my interest.

What is your favorite thing about the Synack Red Team?

There’s so many great things about Synack, it’s hard to pick just one thing. At first, I felt I was tossed into the deep end of the pool with no floaties. I imagine if I went down the traditional bug bounty path I would have been fighting to stay afloat for some time. However, SRT has a great slack that has a lot of amazingly talented people in it. It made me feel like I was on a team again, doing something that matters. It almost felt like I was on Active Duty again, just virtual and cyber instead of physical. Seriously, their leadership is great and they go out of their way to reward mentorship and teamwork which makes it an amazing work environment. I feel like I learn new things every day, which means I have a job that pays me to learn. What’s not to like about that?

Is SRT your main source of income? Or do you do bug bounties/side work as well?

SRT is a side income for me at the moment. I’m currently collecting Social Security Disability, which doesn’t pay very much at all, so the income I make with SRT really helps. 

I have been blessed with a supportive family. When I became ill and got put on disability, they stuck by me during my training for a new career. I’ve since recovered, and being able to work in CyberSec full time has been the end goal. I do presently have a job offer for a decent-sized company in a Red Team role, but I’m not saying too much until the details are ironed out. (I don’t want to jinx myself.)

Any advice for people getting started?

Don’t be afraid to ask questions. There is literally no such thing as a stupid question. Be a sponge and soak in everything that you can. I was asked recently if I ever wanted to quit. Yes, I have. I quit many times a day, like every 30 minutes. But then I take a breath and relax, then that feeling goes away. Also, never be afraid to put yourself out there. I'm continually surprised by all the positive feedback I get from my LinkedIn post sharing my journey into infosec.

 


ChuckDiscord

Thank you for reading along! We love listening to your stories, if you have a cool success story be sure to email us at community@hackthebox.com

Loading Preview...

. If you want to become a member of the Synack Red Team, we highly recommend completing everything in the SRT Track

Loading Preview...

. Lastly, if you just want to chat with other HackTheBox'rs consider joining our Discord Community

Loading Preview...

where we provide guidance, technical help, host private contests, etc.

GET A DEMO FREE TRIAL

Contents

  • What type of work did you do as a "Jarhead" for the United States Marine Corps?
  • What skill sets do you think you picked up from that past life that helped you become a Red Team Operator?
  • You mentioned you had zero experience prior to Hack The Box – How did you pick up foundational skills like how to use Linux/Script/etc?
  • You mentioned you started off hacking HTB Machines alongside the videos, were there any favorite resources you used besides "google" to understand what you were seeing in the videos?
  • How did you choose what boxes to do when starting out on Hack The Box? 
  • What about now? How do you stay on top of the latest vulnerabilities?
  • When it came to taking the OSCP, did your methodology change after each exam attempt? 
  • How did you find out about the Synack Red Team?
  • What is your favorite thing about the Synack Red Team?
  • Is SRT your main source of income? Or do you do bug bounties/side work as well?
  • Any advice for people getting started?

Latest News

Hack the Box Blog

Education

6 min read

Your pentest found nothing. Here’s what to do next.

HTB-Bot avatar HTB-Bot, May 15, 2025

Hack the Box Blog

News

2 min read

Hack The Box invites all corporate teams to benchmark their skills through the Global Cyber Skills Benchmark 2025

Noni avatar Noni, May 12, 2025

Hack the Box Blog

Artificial Intelligence

6 min read

AI Red Teaming explained: Adversarial simulation, testing, and capabilities

b3rt0ll0 avatar b3rt0ll0, May 09, 2025

Hack The Blog

The latest news and updates, direct from Hack The Box

Read More
Hack The Box: Cybersecurity Training

The #1 platform to build attack-ready
teams and organizations.

Get a demo

Forrester wave leader Forrester wave leader
ISO 27001 ISO 27701 ISO 9001
G2 rating Capterra rating

Products
Teams
Courses & Certifications Cyber Ranges Enterprise Attack Simulations Cloud Infrastructure Simulations Capture The Flag Tabletop Exercises Talent Sourcing
Individuals
Courses & Certifications Hacking Labs Defensive Labs Red Team Labs Capture The Flag Job Board
Solutions
Job Roles
Red Teams Blue Teams Purple Teams
Industries
Government Higher Education Finance Professional Services
Use Cases
Technical Onboarding Team Benchmarking Candidate Assessment Threat Management Code Vulnerability Crisis Simulation Governance & Compliance
Resources
Community Blog Industry Reports Webinars AMAs Learn with HTB Customer Stories Cheat Sheets Compliance Sheets Glossary Guides & Templates Parrot OS Help Center
Programs
Channel & Resellers Ambassador Program Affiliate Program SME Program
Company
About us Careers Brand Guidelines Certificate Validation Trust Center Product Updates Status
Contact Us
Press Support Enterprise Sales
Partners
Become a Partner Register a Deal
Store
HTB Swag Buy Gift Cards
Products
Teams
Courses & Certifications Cyber Ranges Enterprise Attack Simulations Cloud Infrastructure Simulations Capture The Flag Tabletop Exercises Talent Sourcing

Individuals

Courses & Certifications Hacking Labs Defensive Labs Red Team Labs Capture The Flag Job Board
Solutions
Job Roles
Red Teams Blue Teams Purple Teams

Industries

Government Higher Education Finance Professional Services

Use Cases

Technical Onboarding Team Benchmarking Candidate Assessment Threat Management Code Vulnerability Crisis Simulation Governance & Compliance
Resources
Community Blog Industry Reports Webinars AMAs Learn with HTB Customer Stories Cheat Sheets Compliance Sheets Glossary Guides & Templates Parrot OS Help Center

Programs

Channel & Resellers Ambassador Program Affiliate Program SME Program
Company
About us Careers Brand Guidelines Certificate Validation Trust Center Product Updates Status

Contact Us

Press Support Enterprise Sales

Partners

Become a Partner Register a Deal

Store

HTB Swag Buy Gift Cards
Cookie Settings
Privacy Policy
User Agreement
© 2025 Hack The Box