Hacker Contest meets usd: Educational cooperation concludes with practical insights into pentesting and IT security

4. August 2023

In the summer semester 2023, the course "Hacker Contest" took place again as a cooperation between usd AG, the Technical University (TU) Darmstadt and the Darmstadt University of Applied Sciences (h_da).

In the course and a following practical assignment, the students gained insights into ethical hacking and its importance for IT security. As in previous semesters, usd invited the participants of the current Hacker Contest to the CST Academy for the final event. In a relaxed atmosphere with pizza and mate, the students had the opportunity to discuss questions about careers in pentesting with the pentest professionals of the usd HeroLab - e.g. the difference between a capture the flag (CTF) and professional pentests.

Matthias Göhring, Head of usd HeroLab, as well as Tobias Hamann and Tim Wörner, Senior Consultants IT Security at usd HeroLab, supervised the educational event from usd's side.

"For me, the event is just the culmination of what was already a great course. It is a pleasure to see how it enables the participants to transfer their passion for information security to the profession of a penetration tester in a fun way. Once again the positive feedback on the Hacker Contest shows us that we can offer the students important tools with this course, which have unfortunately been shortlisted in the lectures so far", concludes Tobias Hamann.

Also interesting:

SWIFT CSCFv2025 - The Three Most Important Questions About the Update

SWIFT CSCFv2025 - The Three Most Important Questions About the Update

Users of the SWIFT network are required to demonstrate compliance with the mandatory security controls through an annual independent audit in accordance with the Customer Security Control Framework (CSCF). As part of this SWIFT Assessment, the security of an...

From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings

From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings

In the dynamic field of cybersecurity, it is often the obscure and long-forgotten vulnerabilities that pose a hidden threat to otherwise hardened systems. One such vulnerability lies in invalid character encodings that violate the UTF-8 standard. While overlong UTF-8...

Categories

Categories