Publications

-
Physical Security - Wenn Türen zu Firewalls werden, Chair of IT Security Infrastructures,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the Chair of IT Security Infrastructures at the University of Erlangen-Nürnberg.
-
-
Mitbringsel aus dem Alltag: Star Wars in der niedersächsischen Provinz, Studierende treffen Alumni und Unternehmensexperten, FH Aachen University of Applied Sciences,
Slides (German)
Slides from the talk “Mitbringsel aus dem Alltag: Star Wars in der niedersächsischen Provinz”, held at the event “Studierende treffen Alumni und Unternehemensexperten” at the FH Aachen University of Applied Sciences.
-
-
“Physical Security – Wenn Türen zu Firewalls werden”, Chair for IT Security Infrastructures,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held online at the Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
-
-
IT-Sicherheit: Unterwegs zwischen zwei Welten
Slides (German)
Slides from the talk “IT-Sicherheit: Unterwegs zwischen zwei Welten”, held at Technologiezentrum Aachen.
-
-
“Physical Security – Wenn Türen zu Firewalls werden”, Chair for IT Security Infrastructures,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held online at the Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
-
-
„Pentesting”, Freitagsseminar, III. Physikalisches Institut B,
Slides (English)
Slides of the talk „Pentesting”, held at the Friday Seminar organized by the III. Physikalisches Institut B of the RWTH Aachen University.
-
-
„Pentesting in der Praxis”, Bonn-Rhein-Sieg University of Applied Sciences,
Slides (German)
Slides of the talk „Pentesting in der Praxis”, held at the practical Hacker training at the Bonn-Rhein-Sieg University of Applied Sciences in Sankt Augustin.
-
-
„Sicherer Umgang mit Daten auf SSDs”, IT-Sicherheitstag NRW,
Slides (German)
Slides of the talk „Sicherer Umgang mit Daten auf SSDs”, held at the IT-Sicherheitstag NRW by the IHK NRW.
-
-
„Sicheres Löschen von Daten auf SSDs”, 8. IT-Forensik Workshop, FH Aachen,
Slides (German)
Slides of the talk „Sicheres Löschen von Daten auf SSDs”, held at the 8. IT-Forensik Workshop of FH Aachen.
-
-
“Physical Security – Wenn Türen zu Firewalls werden”, Chair for IT Security Infrastructures,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
-
-
“Operation gelungen, Patient gläsern? Sicherheitslücken und ihre Konsequenzen im Medizinsektor”, MedLife e.V.,
Slides (German)
Slides from the talk “Operation gelungen, Patient gläsern? Sicherheitslücken und ihre Konsequenzen im Medizinsektor”, held at the MedLife – BusinessTreff spezial: Medical Big Data in Aachen.
-
-
“Daten löschen, aber richtig – Über die Besonderheiten von SSDs”, 24. DFN-Konferenz “Sicherheit in vernetzten Systemen”,
Slides (German)
Slides from the talk “Daten löschen, aber richtig – Über die Besonderheiten von SSDs”, held at the conference 24. DFN-Konferenz “Sicherheit in vernetzten Systemen” in Hamburg.
-
-
“Operating Systems Security And Why It (Mostly) Doesn't Matter”
, Slides
Slides from the guest lecture “Operating Systems Security And Why It (Mostly) Doesn't Matter” held at the Operating Systems Security module at Radboud Universiteit Nijmegen.
-
-
“Alles wird gut? – Über Menschen, Angreifer und die Zukunft”, LeetCon 2016,
Slides (German)
Slides from the talk “Alles wird gut? – Über Menschen, Angreifer und die Zukunft”, held at conference LeetCon 2016 in Hannover.
-
-
“Daten löschen, aber richtig – Über die Besonderheiten von SSDs”, LeetCon 2016,
Slides (German)
Slides from the talk “Daten löschen, aber richtig – Über die Besonderheiten von SSDs”, held at the conference LeetCon 2016 in Hannover.
-
-
“Penetration Tester – Click Monkey or Creative Hacker?”, Research Group IT-Security,
Slides (English)
Slides from the talk “Penetration Tester – Click Monkey or Creative Hacker?”, held at the Security Lab 2016 of the Research Group IT-Security of the RWTH Aachen University.
-
-
“Was Dein ist, ist Mein – Datensicherheit aus der Angreiferperspektive”, Event: “Schutz von Ideen in einer digitalen Welt”,
Slides (German)
Slides of the talk “Was Dein ist, ist Mein - Datensicherheit aus der Angreiferperspektive”, held by Jens Liebchen on the occasion of the World Intellectual Property Day at TZ Aachen.
-
-
“Let's Encrypt with Best Practices”, DevConf.cz 2016,
Slides
Slides from the talk “Let's Encrypt with Best Practices”, held at the DevConf.cz 2016 conference in Brno, Czech Republic.
-
-
“Physical Security – Wenn Türen zu Firewalls werden”, Research Group IT-Security,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the Research Group IT-Security at the RWTH Aachen.
-
-
“Physical Security – Wenn Türen zu Firewalls werden”, Chair for IT Security Infrastructures,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
-
-
“Security Threats at Conferences”, Flock 2015,
Slides
Slides from the talk “Security Threats at Conferences”, held at the Flock 2015 conference in Rochester, NY, USA.
-
-
“Your Home is My Castle – Angriffe auf die Updates eines Heimrouters”, Cryptoparty,
of the Fachschaft Mathematik/Physik/Informatik, Slides (German)
Slides from the talk “Your Home is My Castle – Angriffe auf die Updates eines Heimrouters”, held at the Cryptoparty of the Fachschaft Mathematik/Physik/Informatik of the RWTH Aachen.
-
-
“Angriff zur Verteidigung – Erfolgsfaktoren für gute Penetrationstests”, Audit Challenge 2015 in Frankfurt,
Slides (German)
Slides from the talk “Angriff zur Verteidigung – Erfolgsfaktoren für gute Penetrationstests”, held at the Audit Challenge 2015 in Frankfurt.
-
-
“Achtung, Unfall voraus...?”, VDV,
Slides (German)
Slides from the talk “Achtung, Unfall voraus...?” on IT security in public transport, as presented at the itcs seminar of the year 2015 by the VDV.
-
-
“Erfolgsfaktoren für gute Penetrationstests”, 22. DFN-Konferenz “Sicherheit in vernetzten Systemen”,
Slides (German)
Slides from the talk “Erfolgsfaktoren für gute Penetrationstests”, held at the in Hamburg.
-
-
“Angriff zur Verteidigung – Erfolgsfaktoren für gute Penetrationstests”, IT-Sicherheitstag NRW,
Slides (German)
Slides from the talk “Angriff zur Verteidigung – Erfolgsfaktoren für gute Penetrationstests”, held at the IT-Sicherheitstag NRW in Hagen.
-
-
“Physical Security – Wenn Türen zu Firewalls werden”, Chair for IT Security Infrastructures,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
-
-
“Jailbreaking Your MFP for More Security”, Workshop on system administration in libraries,
Slides (German)
Slides from the talk “Jailbreaking Your MFP for More Security”, held at a Workshop on system administration in libraries at the ZBIW of the Cologne University of Applied Sciences in Cologne. http = []
-
-
“IT-Sicherheit und Kryptographie in der Praxis”, Cryptoparty,
of the Fachschaft Mathematik/Physik/Informatik, Slides (German)
Slides from the talk “IT-Sicherheit und Kryptographie in der Praxis”, held at the Cryptoparty of the Fachschaft Mathematik/Physik/Informatik of the RWTH Aachen University.
-
-
“Jailbreaking Your MFP for More Security”, RWTH Aachen University Admin Meeting,
Slides (German)
Slides from the talk “Jailbreaking Your MFP for More Security”, held at the RWTH Aachen University Admin Meeting in Aachen.
-
-
“Jailbreaking Your MFP for More Security”, 37. Datenschutzfachtagung (DAFTA): “Big Data - Big Responsibility”,
Slides (German)
Slides from the talk “Jailbreaking Your MFP for More Security”, held at the 37. Datenschutzfachtagung (DAFTA) in Cologne.
-
-
“Physical Security – Wenn Türen zu Firewalls werden”, Chair for IT Security Infrastructures,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
-
-
“Jailbreaking Your MFP for More Security”, Linuxtag,
Slides (German)
Slides from the talk “Jailbreaking Your MFP for More Security”, held at the Linuxtag in Berlin.
-
-
“Jailbreaking Your MFP for More Security”, 20. DFN-Workshop “Sicherheit in vernetzten Systemen”,
Slides (German)
Slides from the talk “Jailbreaking Your MFP for More Security”, held at the 20. DFN-Workshop “Sicherheit in vernetzten Systemen” in Hamburg.
-
-
“Sicherheit und Industriespionage – Von technischen und menschlichen Schwächen”, ESMT Management Update 2012,
Slides (German)
Slides from the talk “Sicherheit und Industriespionage – Von technischen und menschlichen Schwächen”, held at the ESMT Management Update 2012 of the European School of Management and Technology (ESMT).
-
-
“Sicherheit und Industriespionage – Von technischen und menschlichen Schwächen”, Technologieforum Telekommunikation,
Slides (German)
Slides from the talk “Sicherheit und Industriespionage – Von technischen und menschlichen Schwächen”, that was held at Technologieforum Telekommunikation of IHK Aachen in Aachen.
-
-
“Theoretische und praktische Risiken der Verwendung von URL-Verkürzungsdiensten”(Slides), 19. DFN-Workshop „Sicherheit in vernetzten Systemen”,
(German)
Slides and paper for the talk “Theoretische und praktische Risiken der Verwendung von URL-Verkürzungsdiensten”, given on Februar 22nd, 2012 at the 19. DFN-Workshop “Sicherheit in vernetzten Systemen”.
-
-
“Physical Security – Wenn Türen zu Firewalls werden”, Fachhochschule Aachen,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the Fachhochschule Aachen in the course Informationssicherheit (information security).
-
-
“Sicherheit und Industriespionage”, ESMT Netzwerktag 2011,
Slides (German)
Slides from the talk “Sicherheit und Industriespionage – Von technischen und menschlichen Schwächen”, held at the ESMT Netzwerktag 2011 on Schloss Gracht.
-
-
“Physical Security – Wenn Türen zu Firewalls werden”, Chair for IT Security Infrastructures,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
-
-
“Datendiebstahl;”, Annual Conference Netzwerk Recherche 2011,
Slides (German)
Slides from the workshop “Aktuelle Fälle von Datendiebstahl und wie sie grundsätzlich funktionieren – Hintergrundwissen für Journalisten”, held at the Netzwerk Recherche's annual conference 2011 in Hamburg.
-
-
“Physical Security – Wenn Türen zu Firewalls werden”, 18th DFN Workshop “Sicherheit in vernetzten Systemen”,
Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the 18th DFN Workshop “Sicherheit in vernetzten Systemen”.
-
-
"Ten Commandments of IT-Security for WEB 2.0 Startups", HackFwd,
Build 0.4, Slides (English)
Slides from the talk "Ten Commandments of IT-Security for WEB 2.0 Startups", held at Build 0.4 of HackFwd.
-
-
“Sicherheit und Industriespionage: Ein Realitätsabgleich”, Fraunhofer Institute for Production Technology,
AK IT-Betrieb, Slides (German)
Slides from the talk “Sicherheit und Industriespionage: Ein Realitätsabgleich”, held on invitation of Fraunhofer Institute for Production Technology IPT in Aachen.
-
-
“Sicherheit und Industriespionage: Ein Realitätsabgleich”, Praktische IT-Sicherheit,
Slides (German)
Slides from the talk “Sicherheit und Industriespionage: Ein Realitätsabgleich”, held at the event Praktische IT-Sicherheit at the Bonn-Rhine-Sieg University of Applied Sciences.
-
-
“Un(der)cover;”, Annual Conference Netzwerk Recherche 2010,
Slides (German)
Slides and link collection from the workshop “Un(der)cover – Von der Online-Recherche hin zur gezielten Generierung neuer Informationsflüsse”, held at the Netzwerk Recherche's annual conference 2010 in Hamburg.
-
-
JBoss Security
Information page about JBoss security with new whitepaper “JBoss AS – Deploying WARs with the DeploymentFileRepository MBean”.
-
-
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”,
Ruhr-Universität Bochum, Video (German)
Video of the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at the Bachelor-Vertiefungspraktikum zur Hackertechnik of the Chair for Network and Data Security, Ruhr-Universität Bochum.
-
-
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, Ruhr-Universität Bochum,
Slides (German)
Slides from the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at the Bachelor-Vertiefungspraktikum zur Hackertechnik of the Chair for Network and Data Security, Ruhr-Universität Bochum.
-
-
“Peeking into Pandora's Bochs – Instrumenting a Full System Emulator to Analyse Malicious Software”, Hackito Ergo Sum 2010,
Slides
Slides from the talk “Peeking into Pandora's Bochs – Instrumenting a Full System Emulator to Analyse Malicious Software”, held at the Hackito Ergo Sum 2010 IT-security conference in Paris.
-
-
“Emulationsbasiertes Entpacken von laufzeitgepackten Schadprogrammen”, 17th DFN Workshop “Sicherheit in vernetzten Systemen”,
Slides (German)
Slides from the talk “Emulationsbasiertes Entpacken von laufzeitpgepackten Schadprogrammen”, held at he 17th DFN Workshop “Sicherheit in vernetzten Systemen”.
-
-
TLS Renegotiation Vulnerability: Proof of Concept Code
RedTeam Pentesting has developed proof of concept code to exploit the vulnerability in the TLS protocol that was published in the beginning of November 2009.
-
-
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”
, Whitepaper
Whitepaper for the talks “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at hack.lu 2008, the 16th DFN-CERT Workshop and at RWTH Aachen University. The Whitepaper contains detailed descriptions of the attacks presented in the talks.
-
-
“Hacking for your Security – Penetration Testing”
, Aachen Technology Entrepreneurship Conference (ATEC) 2009, Slides (German)
Slides from the talk “Hacking for your Security – Penetration Testing”, held at the Aachen Technology Entrepreneurship Conference (ATEC) 2009.
-
-
“Man-in-the-Middle Attacks against the chipTAN comfort Online Banking System”
ChipTAN comfort is a new system that uses a trusted device to securely authorise transactions in online banking. RedTeam Pentesting has examined chipTAN comfort and was able to discover some vulnerabilities in this new system.
-
-
“Hacking for your Security – Penetration Testing”, Lecture “Entrepreneurial Marketing”,
Slides
Slides from the guest talk “Hacking for your Security – Penetration Testing”, held at the lecture “Entrepreneurial Marketing” at the Lehrstuhl Wirtschaftswissenschaften für Ingenieure und Naturwissenschaftler (WIN) of RWTH Aachen University.
-
-
“Peeking into Pandora's Bochs – Instrumenting a Full System Emulator to Analyse Malicious Software”, hack.lu 2009,
Slides
Slides from the talk “Peeking into Pandora's Bochs – Instrumenting a Full System Emulator to Analyse Malicious Software”, held at the hack.lu 2009 IT-security conference in Luxembourg.
-
-
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”, FrOSCon 2009,
Slides (German)
Slides from the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at FrOSCon 2009.
-
-
“Sicherheit und Industriespionage: Ein Realitätsabgleich”, Technologieforum Telekommunikation,
Slides (German)
Slides from the talk “Sicherheit und Industriespionage: Ein Realitätsabgleich”, that was held at Technologieforum Telekommunikation of IHK Aachen in Aachen, Germany.
-
-
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”
, Whitepaper (German)
Whitepaper for the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at hack.lu 2008, the 16th DFN-CERT Workshop and at RWTH Aachen University. The Whitepaper contains detailed descriptions of the attacks presented in the talk.
-
-
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”, Center for Computing and Communication of RWTH Aachen University,
Slides (German)
Slides from the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at the Center for Computing and Communication of RWTH Aachen University. Based on the talks held at the 16th DFN-CERT Workshop and Hack.lu 2008, the time available at this event allowed for more elaborate demonstrations.
-
-
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”, DFN-CERT,
Slides (German)
Slides from the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”, held at the 16th DFN-CERT Workshop in Hamburg. The talk covers typical vulnerabilities of JBoss Application Server installations and their exploitation.
-
-
“Überraschende Angriffsvektoren”, CeBIT,
Slides (German)
Slides from the talk “Überraschende Angriffsvektoren: Weit verbreitet, oft übersehen”, held at the CeBIT. The talk shows exemplary security weaknesses which resulted from wrong assumptions.
-
-
“Practical Security and Crypto”, Eindhoven Institute for the Protection of Systems and Information (EiPSI),
Slides (English)
Slides from the talk “Practical Security and Crypto: Why Mallory Sometimes Doesn't Care”, held at the EiPSI seminar of the Eindhoven University of Technology. The talk explains by means of practical examples mistakes in the usage of cryptography.
-
-
“IT Security in Theorie und Praxis”, IHK Arnsberg,
Slides (German)
Slides from the talk “IT-Security in Theorie und Praxis – Über 'harmlose' Geräte und andere Denkfehler”, held at the IHK Arnsberg at the event “Unternehmenskritische Daten – Gefahren und Schutzmaßnahmen”. Other talks were given by the Verfassungsschutz NRW, the secure-it.nrw initiative as well as the tetraguard GmbH.
-
-
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”, hack.lu 2008,
Slides (English)
Slides from the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”, held at the hack.lu 2008 IT security conference in Luxembourg. The talk covers typical vulnerabilities of JBoss installations and their exploitation.
-
-
“IT Security in Theorie und Praxis”, druckerfachmann.de AG,
Slides (German)
Slides from the talk “IT-Security in Theorie und Praxis – Über 'harmlose' Geräte und andere Denkfehler”, held at an IT security workshop of druckerfachmann.de AG in Berlin.
-
-
“Penetration Testing – Praxis and Beyond”, Deutschsprachige Bull User Society – Arbeitskreis Sicherheit,
Slides (German)
Slides from the talk “Penetration Testing – Praxis and Beyond”, held at the working group Security of the German Speaking Bull User Society in Cologne.
-
-
“Penetration Testing – Praxis and Beyond”, Fachhochschule Aachen,
Slides (German)
Folien zum Vortrag “Penetration Testing – Praxis and Beyond”, held at Aachen University of Applied Sciences.
-
-
“Penetration Testing – Praxis and Beyond”, Berufsakademie Mannheim,
Slides (German)
Slides from the talk “Penetration Testing – Praxis and Beyond”, held at the Berufsakademie Mannheim.
-
-
“Ubiquitous IT Security – Warum die Firewall nicht schützen konnte”, Sicherheit 2008,
Slides (German)
Slides from the talk “Ubiquitous IT Security – Warum die Firewall nicht schützen konnte”, held at the Sicherheit 2008 security conference in Saarbrücken.
-
-
“Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests”, Sicherheit 2008,
Paper (German)
Paper from the talk “Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests”, held at the Sicherheit 2008 security conference in Saarbrücken. The paper was published in the series “Lecture Notes in Informatics” in volume P-128 (ISSN 1617-5468, ISBN 978-3-88579-222-2).
-
-
“Botspy – Effiziente Beobachtung von Botnetzen”, 15. DFN Workshop “Sicherheit in vernetzten Systemen”,
Slides (German)
Slides from the talk “Botspy – Effiziente Beobachtung von Botnetzen”, held at the 15th DFN Workshop “Sicherheit in vernetzten Systemen” in Hamburg.
-
-
“Botspy – Efficient Observation of Botnets”, hack.lu 2007,
Slides (English)
Slides from the talk “Botspy – Efficient Observation of Botnets” at the hack.lu security conference in Kirchberg (Luxembourg).
-
-
“Online-Voodoo: Mehr finden, mehr sehen, mehr wissen. Effektive Recherche im Internet”, Zukunftskongress Ethik 2.0 – Schöne neue Online-Welt? of the DJV,
Slides (German)
Slides from the workshop “Effektive Recherche im Internet”, for the congress for online journalists of the Deutscher Journalisten-Verband.
-
-
“Penetrationtests: Praxisnahe IT-Sicherheit – Ihr Netzwerk aus der Angreiferperspektive”
, Technologieforum Telekommunikation, Slides (German)
Slides from the talk “Penetrationtests: Praxisnahe IT-Sicherheit – Ihr Netzwerk aus der Angreiferperspektive”, that was held at Technologieforum Telekommunikation of IHK Aachen in Aachen, Germany.
-
-
“IT-Security aus dem Nähkästchen – oder – »das kann mir nicht passieren...«”, 14. DFN-Cert Workshop “Sicherheit in vernetzten Systemen”,
Slides (German)
Slides from the talk “IT-Security aus dem Nähkästchen” about typical vulnerabilities, managers do not expect in their company, but which are found in penetration tests nevertheless. The talk was held at the 14th DFN-Cert Workshop “Sicherheit in vernetzten Systemen” (“Security in distributed systems”) in Hamburg, Germany.
-
-
“Penetrationtests – Hacken für mehr Sicherheit?”
- Der EDV-Leiter, article (German)
Jens Liebchen reports about practical experiences doing penetration tests in an article in the german journal “Der EDV-Leiter”.
-
-
„Penetrationtests: Praxisnahe IT-Sicherheit”, AGIT,
Slides (German)
Slides from the talk about penetration testing at the AGIT IT-Sicherheitstag, Technologiezentrum Aachen.
-
-
“Hack.lu 2005 – The Crypto Challenge”, Hack.lu,
Slides (English)
Slides from the lightning talk on the cryptochallenge of Hack.lu 2005. The Talk was held at Hack.lu 2006.
-
-
“Hacking for your security – Penetrationtesting”, Chaos Computer Club Köln e.V. (C4),
Slides (German)
Slides from the presentation about penetration testing held at the OpenChaos. The OpenChaos is organised by the Chaos Computer Club Cologne e.V.. The presentation is based on the presentation at the Center for Computing and Communication of RWTH Aachen.
-
-
“Hacking for your security – Penetrationtesting”, Center for Computing and Communication of RWTH Aachen University,
Slides (German)
Slides from the presentation about penetration testing held at the computer center of the RWTH Aachen, which was a huge success with over 300 participants. The presentation shows in a comprehensible way what pentesting is, what procedures are used and what the benefits of a pentest are. In a subsequent part, common failures are discussed and frequently appearing security flaws are identified.
-
-
“Hacking for Money – Penetrationtesting”
, LinuxTag Stralsund, Slides (German)
Slides from the presentation about penetration testing held at the LinuxTag Stralsund.
-
-
MISC Magazine,
“Hacking for Money – Penetrationtesting”, Volume 1
An article discussing the ideas and procedures of a penetration test, written for MISC (Multi-System & Internet Security Cookbook), a technical magazine about IT-Security.
-
-
“RedTeam warnt vor trügerischer Sicherheit des neuen iTAN-Verfahren”
Press release regarding the introduction of the iTAN system by many german online banks. The release points out the false security promises of the banks and outlines a Man-in-the-Middle attack, showing how it is still possible for phishers et al to get your account data. More articles and references can be found under Press.
-