Road to eJPT – Introduction


It’s been a while since I posted something here.

Today I decided to start my cybersecurity diary. I want to systematize my efforts to obtain cybersecurity-related certificates.

Finally, I have time to knuckle down the eJPT certificate I mentioned in the CyberSec Certification: eJPT & eWPT courses preview article.

If you want to check my assumptions, steps, and impressions about the course – lend an ear!

Continue reading “Road to eJPT – Introduction”

Cryptology 101: Block Cipher Modes of Operation with Python example


Welcome to another Cryptology 101 article!

Today we will discuss block cipher modes of operation.

I know that the topic might not be fascinating, but it is worth to get through it even once.

Believe it or not, during job interviews, I was asked to briefly describe the topic not once, not twice.

We will also cover Python cryptographic libraries topic.

Let’s go 💣!

Continue reading “Cryptology 101: Block Cipher Modes of Operation with Python example”

Android Encryption: First step for secure notepad


Welcome to another Android-related article!

From time to time, everybody needs some privacy. I don’t want to judge, but every person on the planet has sneaky little secrets. Need to hide any information? That’s why encryption was invented.

Today I want to introduce an elementary way to encrypt (and decrypt) data on Android.

Let’s go 💣!

Continue reading “Android Encryption: First step for secure notepad”

Cryptology 101: Encryption

Welcome to my Cryptology 101 article!

Today I would like to describe encryption techniques and introduce distinction arbitrage between such complex and mixed terms: cryptology vs. cryptography, public vs. private key cryptography, or stream and block ciphers (with a limited amount of math!).

We will also learn how to distinguish between ciphers and codes and answer the question: is cryptology a science? 😉

First things first – let’s settle establish who is who in cryptology: encryption section!

Continue reading “Cryptology 101: Encryption”

WebSec 101: JuiceShop ⭐⭐⭐⭐ challenges 3/3


Welcome back, to the third, and the last part of my web sec journey through Juice Shop ⭐⭐⭐⭐ challenges!

Quick reminder: there are 24 ⭐⭐⭐⭐ challenges and I’ve already finished 16 of them and today I’m planning to solve the last 8 from categories: XSS (wow!), Vulnerable Components, Broken Authentication, and Unvalidated Redirects!

Without further ado let’s put the pedal to the metal!

Continue reading “WebSec 101: JuiceShop ⭐⭐⭐⭐ challenges 3/3”

CryptoPy: Caesar Cipher aka Shift Cipher in Python


Today I would like to show you little crypto script, that helped me solve Nested Easter Egg in WebSec 101: JuiceShop ⭐⭐⭐⭐ challenges 2/3!

It’s very basic python implementation of shift cipher, also known as Caesar Cipher, Polybius cipher or ROT 13 (depends on shifting value), which is primitive form of substitution cipher.

I was intending to start writing about things related to cryptography, so we will begin with “back to the roots”!

Continue reading “CryptoPy: Caesar Cipher aka Shift Cipher in Python”

WebSec 101: JuiceShop ⭐⭐⭐⭐ challenges 2/3


Welcome to the second part of my web sec journey through Juice Shop four stars challenges!

Just to remind you, there are 24 ⭐⭐⭐⭐ challenges and I previously coped with 8 of them and today I’m planning to solve another 8 from categories: Injection, Sensitive Data Exposure and Security through Obscurity and Cryptographic Issues 😊 (that’s why I’m also tagging here as #cryptoRelated!)

Let’s get down to hackin!

Continue reading “WebSec 101: JuiceShop ⭐⭐⭐⭐ challenges 2/3”

Blog at

Up ↑