OWASP Seraphimdroid

New version of OWASP Seraphimdroid (v2.0) is published


The art of cyber war

This is the post about a lecture. Very interesting one, held on New York information security meetup by Carl Herberger, Vice President of Security Solutions at Radware.

I found this talk quite interesing because he pointed out that in industry we are facing something we can call a war by its execution. It does not need to be carried by a nation state and he also points out that wars may not be carried because of the territorial and military reasons, but they may have economic or asset dimension. It is described how deception is important in warfare as Sun Tzu said, but also how deception is used in cyberspace. He also gave quite interesing statistics, such as that average cyber


Chasing script-kiddies and hackers on my blog

This morning, I was wondering over my admin dashboard and realized there are couple of guys (hackers or script-kiddies) trying to hack me. Well, to be hones guess my user name and password. So far, they were failing, but some of them were returning and trying every couple of hours, when my blocking mechanism release the block. Particularly, one guy from Moldova, one from Romania and one from Ukraine. To say it on the beginning… I ain’t gonna say something very smart here, I was just playing a bits of forensics here and there, to find out who they are. And to be honest, I am not satisfied, since I have not found much apart from IP address of machine


Hacker’s lament

But did you, in your three-piece psychology and 1950’s
technobrain ever take a look behind the eyes of the Hacker? Did you ever
wonder what made him tick, what forces shaped him, what may have molded

I am a Hacker, enter my world….

Mine is a world that begins with school… I’m smarter than most
of the other kids, this crap they teach us bores me…

Damn underachiever. They’re all alike.

I made a discovery today. I found a comupter. Wait a second,
this is cool. It does what I want it to. If it makes a mistake it’s
because I screwed it up. Not because it doesn’t like me…
Or feels


GreatUniHack – impressions from hackathon

This weekend (17th-19th April 2015.) I was participating GreatUniHack, so I would like to share here some impressions and experiences. GreatUniHack is a 36 hour hackathon organised by University of Manchester students and supported by Major League Hacking – an planetary organisation that supports hackathons around the World. It was held in Old Grenada Studios, the place where I was told Coronation street was filmed and some other popular BBC series.

It was supposed to start at 6PM on Friday 17th April. After a bit of struggling with meeting one of our team member, we managed to arrive at the place at 6:10. We found a table, took couple of photos. In my team was Michele, who is


Pwned by the owner

Couple of months ago I saw one video from Defcon 18, called “Pwned by the owner”. I really liked the story, also the way the presentation was held. So would like to recomend this video both to security guys and to soft skills guys. In short, presentation is actually a story about stolen computer. But hackers’ stolen computer. So it is a story about getting access to own computer, but in hands of the stealer. Speaker explains how he got access to different type of accounts, how he gathered information, lost data, and how he get known with his victim. In other words how he pwned person who stole his computer. Its funny, and you can learn a lot from it. Check it here: