Bei Absagen rutschen in folgender Reihenfolge nach (Backup-Speicher):
- WS-Security (Dennis)
- Security Onion im produktiven Einsatz (Praxis Technik <-> Prozess) - Enterprise Level IDS für 0 Euro (Sebastian) (vgl https://securityonion.net/) (Für Fortgeschrittene, aber nicht allzu hoch)
Gewünschte Themen für weitere Veranstaltungen:
- BurpSuite
- Kaputtes WLAN / KRACK
- WS-Security
- Rest Security OWASP / Rest API
- DFF Digital Forensics Framework
- Ida Pro Workflow
- Social Engineering - Ad Targeting
1. Smart Home - Smart Hack (Michael Steigerwald https://twitter.com/ms_vtrust)
Wie der Weg ins digitale Zuhause zum Spaziergang wird
More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.
2. tbd
3. tbd
Dauer der Vorträge:
Normal: Max 1h 30, Shorty: Kurzvortrag
Weitere Ressourcen IT-Security-Meetup Kassel:
- Alte Vorträge:
-- https://github.com/it-security-kassel-nordhessen/meetup
Bei Absagen rutschen in folgender Reihenfolge nach (Backup-Speicher):
- WS-Security (Dennis)
- Security Onion im produktiven Einsatz (Praxis Technik <-> Prozess) - Enterprise Level IDS für 0 Euro (Sebastian) (vgl https://securityonion.net/) (Für Fortgeschrittene, aber nicht allzu hoch)
Gewünschte Themen für weitere Veranstaltungen:
- BurpSuite
- Kaputtes WLAN / KRACK
- WS-Security
- Rest Security OWASP / Rest API
- DFF Digital Forensics Framework
- Ida Pro Workflow
- Social Engineering - Ad Targeting
1. Smart Home - Smart Hack (Michael Steigerwald https://twitter.com/ms_vtrust)
More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.
2. tbd
3. tbd
Dauer der Vorträge:
Normal: Max 1h 30, Shorty: Kurzvortrag
Weitere Ressourcen IT-Security-Meetup Kassel:
- Alte Vorträge:
-- https://github.com/it-security-kassel-nordhessen/meetup
Bei Absagen rutschen in folgender Reihenfolge nach (Backup-Speicher):
- WS-Security (Dennis)
- Security Onion im produktiven Einsatz (Praxis Technik <-> Prozess) - Enterprise Level IDS für 0 Euro (Sebastian) (vgl https://securityonion.net/) (Für Fortgeschrittene, aber nicht allzu hoch)
Gewünschte Themen für weitere Veranstaltungen:
- BurpSuite
- Kaputtes WLAN / KRACK
- WS-Security
- Rest Security OWASP / Rest API
- DFF Digital Forensics Framework
- Ida Pro Workflow
- Social Engineering - Ad Targeting
1. Smart Home - Smart Hack (Michael Steigerwald https://twitter.com/ms_vtrust)
More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.
2. tbd
3. tbd
Dauer der Vorträge:
Normal: Max 1h 30, Shorty: Kurzvortrag
Weitere Ressourcen IT-Security-Meetup Kassel:
- Alte Vorträge:
-- https://github.com/it-security-kassel-nordhessen/meetup
Bei Absagen rutschen in folgender Reihenfolge nach (Backup-Speicher):
- WS-Security (Dennis)
- Security Onion im produktiven Einsatz (Praxis Technik <-> Prozess) - Enterprise Level IDS für 0 Euro (Sebastian) (vgl https://securityonion.net/) (Für Fortgeschrittene, aber nicht allzu hoch)
Gewünschte Themen für weitere Veranstaltungen:
- BurpSuite
- Kaputtes WLAN / KRACK
- WS-Security
- Rest Security OWASP / Rest API
- DFF Digital Forensics Framework
- Social Engineering - Ad Targeting
- Elliptic Curve Crypto Basics
- Reverse Engineering Radare
- Ida Pro Workflow
- Metasploit
1. Smart Home - Smart Hack (Michael Steigerwald https://twitter.com/ms_vtrust)
More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.
Bei Absagen rutschen in folgender Reihenfolge nach (Backup-Speicher):
- WS-Security (Dennis)
- Security Onion im produktiven Einsatz (Praxis Technik <-> Prozess) - Enterprise Level IDS für 0 Euro (Sebastian) (vgl https://securityonion.net/) (Für Fortgeschrittene, aber nicht allzu hoch)
Gewünschte Themen für weitere Veranstaltungen:
- BurpSuite
- Kaputtes WLAN / KRACK
- WS-Security
- Rest Security OWASP / Rest API
- DFF Digital Forensics Framework
- Social Engineering - Ad Targeting
- Elliptic Curve Crypto Basics
- Reverse Engineering Radare
- Ida Pro Workflow
- Metasploit
1. Smart Home - Smart Hack (Michael Steigerwald https://twitter.com/ms_vtrust)
More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.
Bei Absagen rutschen in folgender Reihenfolge nach (Backup-Speicher):
- WS-Security (Dennis)
- Security Onion im produktiven Einsatz (Praxis Technik <-> Prozess) - Enterprise Level IDS für 0 Euro (Sebastian) (vgl https://securityonion.net/) (Für Fortgeschrittene, aber nicht allzu hoch)
Gewünschte Themen für weitere Veranstaltungen:
- BurpSuite
- Kaputtes WLAN / KRACK
- WS-Security
- Rest Security OWASP / Rest API
- DFF Digital Forensics Framework
- Social Engineering - Ad Targeting
- Elliptic Curve Crypto Basics
- Reverse Engineering Radare
- Ida Pro Workflow
- Metasploit
1. Smart Home - Smart Hack (Michael Steigerwald https://twitter.com/ms_vtrust)
More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.
Bei Absagen rutschen in folgender Reihenfolge nach (Backup-Speicher):
- WS-Security oder OWASP Zap Cockpit (Dennis)
- Security Onion im produktiven Einsatz (Praxis Technik <-> Prozess) - Enterprise Level IDS für 0 Euro (Sebastian) (vgl https://securityonion.net/) (Für Fortgeschrittene, aber nicht allzu hoch)
Gewünschte Themen für weitere Veranstaltungen:
- BurpSuite
- Kaputtes WLAN / KRACK
- WS-Security
- Rest Security OWASP / Rest API
- DFF Digital Forensics Framework
- Social Engineering - Ad Targeting
- Elliptic Curve Crypto Basics
- Reverse Engineering Radare
- Ida Pro Workflow
- Metasploit
1. Smart Home - Smart Hack (Michael Steigerwald https://twitter.com/ms_vtrust)
More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.
Bei Absagen rutschen in folgender Reihenfolge nach (Backup-Speicher):
- WS-Security oder OWASP Zap Cockpit (Dennis)
- Security Onion im produktiven Einsatz (Praxis Technik <-> Prozess) - Enterprise Level IDS für 0 Euro (Sebastian) (vgl https://securityonion.net/) (Für Fortgeschrittene, aber nicht allzu hoch)
Gewünschte Themen für weitere Veranstaltungen:
- BurpSuite
- Kaputtes WLAN / KRACK
- WS-Security
- Rest Security OWASP / Rest API
- DFF Digital Forensics Framework
- Social Engineering - Ad Targeting
- Elliptic Curve Crypto Basics
- Reverse Engineering Radare
- Ida Pro Workflow
- Metasploit
1. Smart Home - Smart Hack (Michael Steigerwald https://twitter.com/ms_vtrust)
More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.
Viele Webframeworks oder CMS-Systeme bringen eine eigene Template-Sprache mit. Häufig gelingt mittels der einer Template-Sprache die Codeausführung auf dem betroffen System. Der Vortrag soll eine Idee vermitteln, welche Template-Angriffe existieren und wie diese vom Angreifer ausgenutzt werden können.
Dauer der Vorträge:
Normal: Max 1h 30, Shorty: Kurzvortrag
Weitere Ressourcen IT-Security-Meetup Kassel:
- Alte Vorträge:
-- https://github.com/it-security-kassel-nordhessen/meetup
Bei Absagen rutschen in folgender Reihenfolge nach (Backup-Speicher):
- WS-Security oder OWASP Zap Cockpit (Dennis)
- Security Onion im produktiven Einsatz (Praxis Technik <-> Prozess) - Enterprise Level IDS für 0 Euro (Sebastian) (vgl https://securityonion.net/) (Für Fortgeschrittene, aber nicht allzu hoch)
Gewünschte Themen für weitere Veranstaltungen:
- BurpSuite
- Kaputtes WLAN / KRACK
- WS-Security
- Rest Security OWASP / Rest API
- DFF Digital Forensics Framework
- Social Engineering - Ad Targeting
- Elliptic Curve Crypto Basics
- Reverse Engineering Radare
- Ida Pro Workflow
- Metasploit
1. Smart Home - Smart Hack (Michael Steigerwald https://twitter.com/ms_vtrust)
More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.
Viele Webframeworks oder CMS-Systeme bringen eine eigene Template-Sprache mit. Häufig gelingt mittels einer Template-Sprache die Codeausführung auf dem betroffen System. Der Vortrag soll eine Idee vermitteln, welche Template-Angriffe existieren und wie diese vom Angreifer ausgenutzt werden können.
Dauer der Vorträge:
Normal: Max 1h 30, Shorty: Kurzvortrag
Weitere Ressourcen IT-Security-Meetup Kassel:
- Alte Vorträge:
-- https://github.com/it-security-kassel-nordhessen/meetup
Bei Absagen rutschen in folgender Reihenfolge nach (Backup-Speicher):
- WS-Security oder OWASP Zap Cockpit (Dennis)
- Security Onion im produktiven Einsatz (Praxis Technik <-> Prozess) - Enterprise Level IDS für 0 Euro (Sebastian) (vgl https://securityonion.net/) (Für Fortgeschrittene, aber nicht allzu hoch)
Gewünschte Themen für weitere Veranstaltungen:
- BurpSuite
- Kaputtes WLAN / KRACK
- WS-Security
- Rest Security OWASP / Rest API
- DFF Digital Forensics Framework
- Social Engineering - Ad Targeting
- Elliptic Curve Crypto Basics
- Reverse Engineering Radare
- Ida Pro Workflow
- Metasploit