Publications
- -
“Daten löschen, aber richtig – Über die Besonderheiten von SSDs”,
24. DFN-Konferenz “Sicherheit in vernetzten Systemen”, Slides (German)
Slides from the talk “Daten löschen, aber richtig – Über die Besonderheiten von SSDs”, held at the conference
24. DFN-Konferenz “Sicherheit in vernetzten Systemen” in Hamburg.
- -
“Operating Systems Security And Why It (Mostly) Doesn't Matter”, Slides
Slides from the guest lecture “Operating Systems Security And Why It (Mostly) Doesn't Matter” held at the
Operating Systems Security module at
Radboud Universiteit Nijmegen.
- -
“Daten löschen, aber richtig – Über die Besonderheiten von SSDs”,
LeetCon 2016, Slides (German)
Slides from the talk “Daten löschen, aber richtig – Über die Besonderheiten von SSDs”, held at the conference
LeetCon 2016 in Hannover.
- -
“Alles wird gut? – Über Menschen, Angreifer und die Zukunft”,
LeetCon 2016, Slides (German)
Slides from the talk “Alles wird gut? – Über Menschen, Angreifer und die Zukunft”, held at conference
LeetCon 2016 in Hannover.
- -
“Penetration Tester – Click Monkey or Creative Hacker?”,
Research Group IT-Security, Slides (English)
Slides from the talk “Penetration Tester – Click Monkey or Creative Hacker?”, held at the
Security Lab 2016 of the Research Group IT-Security of the
RWTH Aachen University.
- -
“Was Dein ist, ist Mein – Datensicherheit aus der Angreiferperspektive”, Event: “
Schutz von Ideen in einer digitalen Welt”, Slides (German)
Slides of the talk “Was Dein ist, ist Mein - Datensicherheit aus der Angreiferperspektive”, held by Jens Liebchen on the occasion of the World Intellectual Property Day at
TZ Aachen.
- -
“Let's Encrypt with Best Practices”,
DevConf.cz 2016, Slides
Slides from the talk “Let's Encrypt with Best Practices”, held at the
DevConf.cz 2016 conference in Brno, Czech Republic.
- -
“Physical Security – Wenn Türen zu Firewalls werden”,
Research Group IT-Security, Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the
Research Group IT-Security at the RWTH Aachen.
- -
“Physical Security – Wenn Türen zu Firewalls werden”,
Chair for IT Security Infrastructures, Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the
Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
- -
“Security Threats at Conferences”,
Flock 2015, Slides
Slides from the talk “Security Threats at Conferences”, held at the
Flock 2015 conference in Rochester, NY, USA.
- -
“Your Home is My Castle – Angriffe auf die Updates eines Heimrouters”,
Cryptoparty of the
Fachschaft Mathematik/Physik/Informatik, Slides (German)
Slides from the talk “Your Home is My Castle – Angriffe auf die Updates eines Heimrouters”, held at the
Cryptoparty of the
Fachschaft Mathematik/Physik/Informatik of the RWTH Aachen.
- -
“Angriff zur Verteidigung – Erfolgsfaktoren für gute Penetrationstests”,
Audit Challenge 2015 in Frankfurt, Slides (German)
Slides from the talk “Angriff zur Verteidigung – Erfolgsfaktoren für gute Penetrationstests”, held at the
Audit Challenge 2015 in Frankfurt.
- -
“Achtung, Unfall voraus...?”, itcs seminar of the year 2015,
VDV, Slides (German)
Slides from the talk “Achtung, Unfall voraus...?” on IT security in public transport, as presented at the itcs seminar of the year 2015 by the
VDV.
- -
“Erfolgsfaktoren für gute Penetrationstests”,
22. DFN-Konferenz “Sicherheit in vernetzten Systemen”, Slides (German)
Slides from the talk “Erfolgsfaktoren für gute Penetrationstests”, held at the
in Hamburg.
- -
“Angriff zur Verteidigung – Erfolgsfaktoren für gute Penetrationstests”,
IT-Sicherheitstag NRW, Slides (German)
Slides from the talk “Angriff zur Verteidigung – Erfolgsfaktoren für gute Penetrationstests”, held at the
IT-Sicherheitstag NRW in Hagen.
- -
“Physical Security – Wenn Türen zu Firewalls werden”,
Chair for IT Security Infrastructures, Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the
Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
- -
“Jailbreaking Your MFP for More Security”,
Workshop on system administration in libraries, Slides (German)
Slides from the talk “Jailbreaking Your MFP for More Security”, held at a Workshop on system administration in libraries at the
ZBIW of the Cologne University of Applied Sciences in Cologne.
- -
“IT-Sicherheit und Kryptographie in der Praxis”,
Cryptoparty of the
Fachschaft Mathematik/Physik/Informatik, Slides (German)
Slides from the talk “IT-Sicherheit und Kryptographie in der Praxis”, held at the
Cryptoparty of the
Fachschaft Mathematik/Physik/Informatik of the RWTH Aachen University.
- -
“Jailbreaking Your MFP for More Security”,
RWTH Aachen University Admin Meeting, Slides (German)
Slides from the talk “Jailbreaking Your MFP for More Security”, held at the
RWTH Aachen University Admin Meeting in Aachen.
- -
“Jailbreaking Your MFP for More Security”,
37. Datenschutzfachtagung (DAFTA): “Big Data - Big Responsibility”, Slides (German)
Slides from the talk “Jailbreaking Your MFP for More Security”, held at the
37. Datenschutzfachtagung (DAFTA) in Cologne.
- -
“Physical Security – Wenn Türen zu Firewalls werden”,
Chair for IT Security Infrastructures, Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the
Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
- -
“Jailbreaking Your MFP for More Security”,
Linuxtag, Slides (German)
Slides from the talk “Jailbreaking Your MFP for More Security”, held at the
Linuxtag in Berlin.
- -
“Jailbreaking Your MFP for More Security”,
20. DFN-Workshop “Sicherheit in vernetzten Systemen”, Slides (German)
Slides from the talk “Jailbreaking Your MFP for More Security”, held at the
20. DFN-Workshop “Sicherheit in vernetzten Systemen” in Hamburg.
- -
“Sicherheit und Industriespionage – Von technischen und menschlichen Schwächen”,
ESMT Management Update 2012, Slides (German)
Slides from the talk “Sicherheit und Industriespionage – Von technischen und menschlichen Schwächen”, held at the
ESMT Management Update 2012 of the
European School of Management and Technology (ESMT).
- -
“Sicherheit und Industriespionage – Von technischen und menschlichen Schwächen”,
Technologieforum Telekommunikation, Slides (German)
Slides from the talk “Sicherheit und Industriespionage – Von technischen und menschlichen Schwächen”, that was held at
Technologieforum Telekommunikation of
IHK Aachen in Aachen.
- -
“Theoretische
und praktische Risiken der Verwendung von
URL-Verkürzungsdiensten”(
Slides),
19. DFN-Workshop “Sicherheit in vernetzten Systemen”, (German)
Slides and paper for the talk “Theoretische und praktische Risiken der Verwendung von URL-Verkürzungsdiensten”, given on Februar 22nd, 2012 at the
19. DFN-Workshop “Sicherheit in vernetzten Systemen”.
- -
“Physical Security – Wenn Türen zu Firewalls werden”,
Fachhochschule Aachen, Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the
Fachhochschule Aachen in the course
Informationssicherheit (information security).
- -
“Sicherheit und Industriespionage”,
ESMT Netzwerktag 2011, Slides (German)
Slides from the talk “Sicherheit und Industriespionage – Von technischen und menschlichen Schwächen”, held at the
ESMT Netzwerktag 2011 on Schloss Gracht.
- -
“Physical Security – Wenn Türen zu Firewalls werden”,
Chair for IT Security Infrastructures, Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the
Chair for IT Security Infrastructures at the University of Erlangen-Nürnberg.
- -
“Datendiebstahl;”,
Annual Conference Netzwerk Recherche 2011, Slides (German)
Slides from the workshop “Aktuelle Fälle von Datendiebstahl und wie sie grundsätzlich funktionieren – Hintergrundwissen für Journalisten”, held at the
Netzwerk Recherche's
annual conference 2011 in Hamburg.
- -
“Physical Security – Wenn Türen zu Firewalls werden”,
18th DFN Workshop “Sicherheit in vernetzten Systemen”, Slides (German)
Slides from the talk “Physical Security – Wenn Türen zu Firewalls werden”, held at the
18th DFN Workshop “Sicherheit in vernetzten Systemen”.
- -
"Ten Commandments of IT-Security for WEB 2.0 Startups",
HackFwd
Build 0.4, Slides (English)
Slides from the talk "Ten Commandments of IT-Security for WEB 2.0 Startups", held at
Build 0.4 of
HackFwd.
- -
“Sicherheit und Industriespionage: Ein Realitätsabgleich”,
Fraunhofer Institute for Production Technology, AK IT-Betrieb, Slides (German)
Slides from the talk “Sicherheit und Industriespionage: Ein Realitätsabgleich”, held on invitation of
Fraunhofer Institute for Production Technology IPT in Aachen.
- -
“Sicherheit und Industriespionage: Ein Realitätsabgleich”,
Praktische IT-Sicherheit, Slides (German)
Slides from the talk “Sicherheit und Industriespionage: Ein Realitätsabgleich”, held at the event
Praktische IT-Sicherheit at the
Bonn-Rhine-Sieg University of Applied Sciences.
- -
“Un(der)cover;”,
Annual Conference Netzwerk Recherche 2010, Slides (German)
Slides and link collection from the workshop “Un(der)cover – Von der Online-Recherche hin zur gezielten Generierung neuer Informationsflüsse”, held at the
Netzwerk Recherche's
annual conference 2010 in Hamburg.
- - JBoss Security
Information page about JBoss security with new whitepaper “JBoss AS – Deploying WARs with the DeploymentFileRepository MBean”.
- -
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”,
Ruhr-Universität Bochum, Video (German)
Video of the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at the
Bachelor-Vertiefungspraktikum zur Hackertechnik of the
Chair for Network and Data Security,
Ruhr-Universität Bochum.
- -
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”,
Ruhr-Universität Bochum, Slides (German)
Slides from the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at the
Bachelor-Vertiefungspraktikum zur Hackertechnik of the
Chair for Network and Data Security,
Ruhr-Universität Bochum.
- -
“Peeking into Pandora's Bochs – Instrumenting a Full System Emulator to Analyse Malicious Software”,
Hackito Ergo Sum 2010, Slides
Slides from the talk “Peeking into Pandora's Bochs – Instrumenting a Full System Emulator to Analyse Malicious Software”, held at the
Hackito Ergo Sum 2010 IT-security conference in Paris.
- -
“Emulationsbasiertes Entpacken von laufzeitgepackten Schadprogrammen”,
17th DFN Workshop “Sicherheit in vernetzten Systemen”, Slides (German)
Slides from the talk “Emulationsbasiertes Entpacken von laufzeitpgepackten Schadprogrammen”, held at he
17th DFN Workshop “Sicherheit in vernetzten Systemen”.
- -
TLS Renegotiation Vulnerability: Proof of Concept Code
RedTeam Pentesting has developed proof of concept code to exploit the vulnerability in the TLS protocol that was published in the beginning of November 2009.
- -
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”, Whitepaper
Whitepaper for the talks “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at
hack.lu 2008, the
16th DFN-CERT Workshop and at
RWTH Aachen University. The Whitepaper contains detailed descriptions of the attacks presented in the talks.
- -
“Hacking for your Security – Penetration Testing”, Aachen Technology Entrepreneurship Conference (ATEC) 2009, Slides (German)
Slides from the talk “Hacking for your Security – Penetration Testing”, held at the Aachen Technology Entrepreneurship Conference (ATEC) 2009.
- -
“Man-in-the-Middle Attacks against the chipTAN comfort Online Banking System”
ChipTAN comfort is a new system that uses a trusted device to securely authorise transactions in online banking. RedTeam Pentesting has examined chipTAN comfort and was able to discover some vulnerabilities in this new system.
- -
“Hacking for your Security – Penetration Testing”,
Lecture “Entrepreneurial Marketing”, Slides
Slides from the guest talk “Hacking for your Security – Penetration Testing”, held at the lecture
“Entrepreneurial Marketing” at the
Lehrstuhl Wirtschaftswissenschaften für Ingenieure und Naturwissenschaftler (WIN) of
RWTH Aachen University.
- -
“Peeking into Pandora's Bochs – Instrumenting a Full System Emulator to Analyse Malicious Software”,
hack.lu 2009, Slides
Slides from the talk “Peeking into Pandora's Bochs – Instrumenting a Full System Emulator to Analyse Malicious Software”, held at the
hack.lu 2009 IT-security conference in Luxembourg.
- -
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”,
FrOSCon 2009, Slides (German)
Slides from the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at
FrOSCon 2009.
- -
“Sicherheit und Industriespionage: Ein Realitätsabgleich”,
Technologieforum Telekommunikation, Slides (German)
Slides from the talk “Sicherheit und Industriespionage: Ein Realitätsabgleich”, that was held at
Technologieforum Telekommunikation of
IHK Aachen in Aachen, Germany.
- -
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”, Whitepaper (German)
Whitepaper for the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at
hack.lu 2008, the
16th DFN-CERT Workshop and at
RWTH Aachen University. The Whitepaper contains detailed descriptions of the attacks presented in the talk.
- -
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”,
Center for Computing and Communication of RWTH Aachen University, Slides (German)
Slides from the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now”, held at the
Center for Computing and Communication of RWTH Aachen University. Based on the talks held at the
16th DFN-CERT Workshop and
Hack.lu 2008, the time available at this event allowed for more elaborate demonstrations.
- -
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”,
DFN-CERT, Slides (German)
Slides from the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”, held at the
16th DFN-CERT Workshop in Hamburg. The talk covers typical vulnerabilities of JBoss Application Server installations and their exploitation.
- -
“Überraschende Angriffsvektoren”,
CeBIT, Slides (German)
Slides from the talk “Überraschende Angriffsvektoren: Weit verbreitet, oft übersehen”, held at the CeBIT. The talk shows exemplary security weaknesses which resulted from wrong assumptions.
- -
“Practical Security and Crypto”,
Eindhoven Institute for the Protection of Systems and Information (EiPSI), Slides (English)
Slides from the talk “Practical Security and Crypto: Why Mallory Sometimes Doesn't Care”, held at the
EiPSI seminar of the
Eindhoven University of Technology. The talk explains by means of practical examples mistakes in the usage of cryptography.
- -
“IT Security in Theorie und Praxis”,
IHK Arnsberg, Slides (German)
Slides from the talk “IT-Security in Theorie und Praxis – Über 'harmlose' Geräte und andere Denkfehler”, held at the
IHK Arnsberg at the event “Unternehmenskritische Daten – Gefahren und Schutzmaßnahmen”. Other talks were given by the Verfassungsschutz NRW, the secure-it.nrw initiative as well as the tetraguard GmbH.
- -
“Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”,
hack.lu 2008, Slides (English)
Slides from the talk “Bridging the Gap between the Enterprise and You – or – Who's the JBoss now?”, held at the
hack.lu 2008 IT security conference in Luxembourg. The talk covers typical vulnerabilities of JBoss installations and their exploitation.
- -
“IT Security in Theorie und Praxis”,
druckerfachmann.de AG, Slides (German)
Slides from the talk “IT-Security in Theorie und Praxis – Über 'harmlose' Geräte und andere Denkfehler”, held at an IT security workshop of
druckerfachmann.de AG in Berlin.
- -
“Penetration Testing – Praxis and Beyond”,
Deutschsprachige Bull User Society – Arbeitskreis Sicherheit, Slides (German)
Slides from the talk “Penetration Testing – Praxis and Beyond”, held at the working group Security of the
German Speaking Bull User Society in Cologne.
- -
“Penetration Testing – Praxis and Beyond”,
Fachhochschule Aachen, Slides (German)
Folien zum Vortrag “Penetration Testing – Praxis and Beyond”, held at
Aachen University of Applied Sciences.
- -
“Penetration Testing – Praxis and Beyond”,
Berufsakademie Mannheim, Slides (German)
Slides from the talk “Penetration Testing – Praxis and Beyond”, held at the
Berufsakademie Mannheim.
- -
“Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests”,
Sicherheit 2008, Paper (German)
Paper from the talk “Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests”, held at the
Sicherheit 2008 security conference in Saarbrücken. The paper was published in the series “Lecture Notes in Informatics” in volume P-128 (ISSN 1617-5468, ISBN 978-3-88579-222-2).
- -
“Ubiquitous IT Security – Warum die Firewall nicht schützen konnte”,
Sicherheit 2008, Slides (German)
Slides from the talk “Ubiquitous IT Security – Warum die Firewall nicht schützen konnte”, held at the
Sicherheit 2008 security conference in Saarbrücken.
- -
“Botspy – Effiziente Beobachtung von Botnetzen”,
15. DFN Workshop “Sicherheit in vernetzten Systemen”, Slides (German)
Slides from the talk “Botspy – Effiziente Beobachtung von Botnetzen”, held at the
15th DFN Workshop “Sicherheit in vernetzten Systemen” in Hamburg.
- -
“Botspy – Efficient Observation of Botnets”,
hack.lu 2007, Slides (English)
Slides from the talk “Botspy – Efficient Observation of Botnets” at the
hack.lu security conference in Kirchberg (Luxembourg).
- -
“Online-Voodoo: Mehr finden, mehr sehen, mehr wissen. Effektive Recherche im Internet”,
Zukunftskongress Ethik 2.0 – Schöne neue Online-Welt? of the DJV, Slides (German)
Slides from the workshop “Effektive Recherche im Internet”, for the
congress for online journalists of the
Deutscher Journalisten-Verband.
- -
“Penetrationtests: Praxisnahe IT-Sicherheit – Ihr Netzwerk aus der Angreiferperspektive”, Technologieforum Telekommunikation, Slides (German)
Slides from the talk “Penetrationtests: Praxisnahe IT-Sicherheit – Ihr Netzwerk aus der Angreiferperspektive”, that was held at Technologieforum Telekommunikation of
IHK Aachen in Aachen, Germany.
- -
“IT-Security aus dem Nähkästchen – oder – »das kann mir nicht passieren...«”,
14. DFN-Cert Workshop “Sicherheit in vernetzten Systemen”, Slides (German)
Slides from the talk “IT-Security aus dem Nähkästchen” about typical vulnerabilities, managers do not expect in their company, but which are found in penetration tests nevertheless. The talk was held at the 14th DFN-Cert Workshop “Sicherheit in vernetzten Systemen” (“Security in distributed systems”) in Hamburg, Germany.
- -
“Penetrationtests – Hacken für mehr Sicherheit?” -
Der EDV-Leiter, article (German)
Jens Liebchen reports about practical experiences doing penetration tests in an article in the german journal “Der EDV-Leiter”.
-
08/12/2006 -
“Penetrationtests: Praxisnahe IT-Sicherheit”,
AGIT, Slides (German)
Slides from the talk about penetration testing at the AGIT IT-Sicherheitstag, Technologiezentrum Aachen.
-
-
“Hack.lu 2005 – The Crypto Challenge”,
Hack.lu, Slides (English)
Slides from the lightning talk on the cryptochallenge of Hack.lu 2005. The Talk was held at Hack.lu 2006.
-
-
“Hacking for your security – Penetrationtesting”,
Chaos Computer Club Köln e.V. (C4), Slides (German)
Slides from the presentation about penetration testing held at the
OpenChaos. The
OpenChaos is organised by the
Chaos Computer Club Cologne e.V.. The
presentation is based on the presentation at the Center for Computing
and Communication of RWTH Aachen.
-
-
“Hacking for your security – Penetrationtesting”,
Center for Computing and Communication of RWTH Aachen University, Slides (German)
Slides from the presentation about penetration testing held at the computer center of the RWTH Aachen, which was a huge success with over 300 participants. The presentation shows in a comprehensible way what pentesting is, what procedures are used and what the benefits of a pentest are. In a subsequent part, common failures are discussed and frequently appearing security flaws are identified.
- -
“Hacking for Money – Penetrationtesting”, LinuxTag Stralsund, Slides (German)
Slides from the presentation about penetration testing held at the LinuxTag Stralsund.
- - “Hacking for Money – Penetrationtesting”,
MISC Magazine, Volume 1
An article discussing the ideas and procedures of a penetration test, written for MISC (Multi-System & Internet Security Cookbook), a technical magazine about IT-Security.
- - “RedTeam warnt vor trügerischer Sicherheit des neuen iTAN-Verfahren”
Press release regarding the introduction of the iTAN system by many german online banks. The release points out the false security promises of the banks and outlines a Man-in-the-Middle attack, showing how it is still possible for phishers et al to get your account data. More articles and references can be found under Press.

