Dynamic Application Red Team Simulation
Berezha is an Application Security and Penetration Testing Company. DARTS is the platform that simplifies penetration tests, automates report generation, and integrates external data sources.
Berezha is an Application Security and Penetration Testing Company. DARTS is the platform that simplifies penetration tests, automates report generation, and integrates external data sources.
NoNameCon is a 100% community-built practical cybersecurity conference in Kyiv, Ukraine. There were several workshops and a CTF game held during the event.
As a part of the team I was working on the admin application for the CTF game.
BruCON 0x0B (2019) - the cyber security conference.
The 5th annual OWASP Ukraine 2019 - the biggest Ukrainian Application Security conference held under the aegis of OWASP Lviv, Kyiv, Dnipro and Kharkiv chapters.
OWASP Ukraine - the biggest Ukrainian Application Security conference held under the aegis of OWASP Lviv, Kyiv, Dnipro and Kharkiv chapters.
The application was created to show simple countdowns on the speakers' monitors to notify them about their timframes or to show short messages
The 2nd annual NoNameCon - a 100% community-built practical cyber security conference.
«Shlyapa-Pay» is a fake payment system created for a CTF(Capture The Flag hacking game) held by «Berezha Security».
This payment system has its own website, blog, integration with ActiveMerchant as a fake payment processing. It behaves almost the same way as a common payment systems like PayPal or WebMoney allowing users to send and receive costs to/from each other. The project has its own shopping cart and kind of social network created with several pre-defined vulnerabilities in mind.
«Shlyapa-Pay» was used in game held during International forum «Cybersecurity: Ukraine and the world» and then, after fixing all the vulnerabilities and adding new ones, was a part of a game at the Cybersecurity Olympiad «HackIT-2015»
«MyBestDate» is a fake Dating website created for a CTF(Capture The Flag security game) organised for UISGCon 11(2015) - Ukrainian InfoSec conference held by Non-Government Organisation «Ukrainian Information Security Group»
This Dating website had no real users or profiles and was created with several pre-defined vulnerabilities that allowed researchers to get flags and proceed with the next part of the hacking game. It has integrated chat and rating systems to allows gamers to use their skills on a system close to real ones.
«FindMeGetMe» is a fake Dating website with an API for mobile application created for the CTF(Capture The Flag hacking game) organised for UISGCon 11(2015) - Ukrainian InfoSec conference held by Non-Government Organisation «Ukrainian Information Security Group»
This Fake Dating website was created for security enthusiasts and had no real users or profiles. It was created with a pre-defined vulnerabilities related to Redis and Sockets. I used a Free design and added vulnerable Rack application that gets photos from Redis service using Sockets technology.
«FindMeGetMe» is a fake Dating website with an API for mobile application created for a CTF(Capture The Flag hacking game) organised for UISGCon 11(2015) - Ukrainian InfoSec conference held by Non-Government Organisation «Ukrainian Information Security Group»UISG
This is a mobile iOS and Android multiplatform application that connects to FindMeGetMe.xyz to get information about fake accounts through the API. The application had several functions to hide the server it was connected to obfuscating its JS code.