{"id":11762,"date":"2021-05-06T12:52:44","date_gmt":"2021-05-06T10:52:44","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/security-analysis-pentests\/live-hacking\/"},"modified":"2025-09-18T11:28:52","modified_gmt":"2025-09-18T09:28:52","slug":"live-hacking","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-analysis-pentests\/live-hacking\/","title":{"rendered":"Live Hacking"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||60px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-analysis-header-allgemein.jpg\" custom_margin=\"-31px||0px||false|false\" custom_padding=\"166px|60px|62px|60px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center\">Live Hacking<\/h1>\n<p style=\"text-align: center\">\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<div class=\"x-text\">\n<p><span>Live Hacking is one of the most impressive and entertaining ways to demonstrate how easy it is for criminals to gain access to third party data or to spy on others. As a stand-alone event or integrated into your regular meetings \u2013 live hacking is the ideal tool for sustainably increasing security awareness in your company.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Catalog of topics<\/h2>\n<p><span>Each hack can be combined and, if desired, packed into a \u201ewar story\u201c. We are also happy to consider other individual wishes you may have. Live Hacking sessions take between 10 and 30 minutes.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_background_color=\"#FFFFFF\" closed_toggle_background_color=\"#FFFFFF\" icon_color=\"#F07F1D\" use_icon_font_size=\"on\" icon_font_size=\"23px\" _builder_version=\"4.27.4\" _module_preset=\"default\" body_font=\"|300|||||||\" body_font_size=\"16px\" custom_margin=\"4px|0px|-1px|0px|false|true\" hover_enabled=\"0\" border_radii=\"on|5px|5px|5px|5px\" border_color_all=\"#F6F6F6\" box_shadow_style=\"preset1\" box_shadow_spread=\"-11px\" box_shadow_color=\"rgba(0,0,0,0.22)\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][et_pb_accordion_item title=\"Nicht bearbeiten!\" open=\"on\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"AI Hack\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.27.4\" _module_preset=\"default\" hover_enabled=\"0\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\" sticky_enabled=\"0\"]<\/p>\n<p>This scenario demonstrates how AI code editors can be used to create web applications fully automatically and the risks associated with this. What appears efficient at first glance may contain serious vulnerabilities hidden and can be exploited by attackers.<br \/><strong>Duration<\/strong><span>: 20 minutes<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Google Hacking\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.16\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p><span>Using what is known as Google Dorks, it is very easy to gain access to unprotected systems such as printers or webcams over the internet.<\/span><br \/><strong>Duration<\/strong><span>: 10 minutes<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Credit cards\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.16\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p><span>This scenario demonstrates how credit cards with a contactless payment function can be read using a smartphone.<\/span><br \/><strong>Duration:<\/strong><span>\u00a010 minutes<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Phishing\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.16\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p><span>This hack demonstrates how dangerous phishing emails can be for careless or untrained users and how phishing attacks can irreversibly transfer money to an attacker\u2018s account.<\/span><br \/><strong>Duration:<\/strong><span>\u00a025 minutes<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Presenter Hack\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.16\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p><span>This scenario demonstrates, how an attacker can get unauthorized access to the system via the radio interface of a presenter.<\/span><br \/><strong>Duration:<\/strong><span>\u00a015 minutes<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Rubber Ducky\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.16\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p><span>Using a USB flash drive, an attacker can compromise systems without much effort in order to access or encrypt data.<\/span><br \/><strong>Duration:<\/strong><span>\u00a015 minutes<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"SMS Spoofing\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.16\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p><span>This scenario illustrates how easily SMS messages can be forged and addresses the risks associated with SMS spoofing in combination with other attack scenarios.<\/span><br \/><strong>Duration:<\/strong><span>\u00a010 minutes<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"SQL Injection\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.16\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<div class=\"x-accordion-group\">\n<div id=\"panel-60d30eb424087\" class=\"x-accordion-body\" role=\"tabpanel\" data-x-toggle-collapse=\"1\" data-x-toggleable=\"60d30eb424087\" aria-hidden=\"false\" aria-labelledby=\"tab-60d30eb424087\">\n<div class=\"x-accordion-inner\">This hack shows how an attacker can use SQL Injection to get unauthorized access to a sample online bank.<br \/><strong>Duration:<\/strong><span>\u00a0<\/span>20 minutes<\/div>\n<\/div>\n<\/div>\n<div class=\"x-accordion-group\">\n<div class=\"x-accordion-heading\"><\/div>\n<\/div>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"WLAN Hack\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.16\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p><span>This hack demonstrates the risks connected to the use of public networks and also shows how dangerous the automatic WiFi search function of mobile devices can be.<\/span><br \/><strong>Duration:<\/strong><span>\u00a020 minutes<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Business Logic Flaw\" closed_toggle_text_color=\"#3C3C3C\" _builder_version=\"4.17.1\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"16px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p data-pm-slice=\"1 1 []\">Due to complex applications, errors in the business logic (so-called business logic vulnerabilities) are not uncommon and can have fatal business-damaging consequences. In addition, these do not require a deep technical understanding, but often just a little creativity.<br \/><strong>Duration:<\/strong><span> 10 minutes<\/span><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||3px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<div class=\"x-text\">\n<h2>Agenda<\/h2>\n<p><span>Each session starts with a short introduction before proceeding to the actual live hacking demonstration. If required, we schedule in extra time for attendees to ask questions and discuss the issues afterwards.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"61px|0px|0px|0px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<div class=\"x-text\">\n<h2>Our Analysts<\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"2px|auto|2px|auto|true|false\" custom_padding=\"3px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-live-hacking.jpeg\" title_text=\"usd-herolab-live-hacking\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<div class=\"x-text\">\n<div class=\"x-main left\" role=\"main\">\n<article id=\"post-25170\" class=\"post-25170 page type-page status-publish hentry no-post-thumbnail\">\n<div class=\"entry-wrap\">\n<div class=\"entry-content content\">\n<div id=\"cs-content\" class=\"cs-content\">\n<div class=\"e25170-10 x-section\">\n<div class=\"e25170-33 x-container max width\">\n<div class=\"e25170-36 x-column x-sm x-2-3\">\n<div class=\"x-text\">\n<p>Our Security Analysts at the<span>\u00a0<\/span><a href=\"https:\/\/herolab.usd.de\/en\/\" target=\"_blank\" rel=\"noopener\">usd HeroLab<\/a><span>\u00a0<\/span>have many years of practical experience in identifying vulnerabilities and performing<span>\u00a0<\/span><a href=\"\/en\/pentest\/\">pentests<\/a>, i.e. in legally hacking our international clients. Moreover, our pentesters are certified according to internationally recognized standards, such as the \u201cCertified Ethical Hacker\u201d, or the \u201cOffensive Security Certified Professional\u201d.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<aside class=\"x-sidebar right\" role=\"complementary\">\n<div id=\"text-97\" class=\"widget widget_text\">\n<div class=\"textwidget\">\n<div class=\"e cs-content x-global-block x-global-block-25149\">\n<div class=\"e25149-1 x-section\">\n<div class=\"e25149-2 x-container max width\">\n<div class=\"e25149-3 x-column x-sm x-1-1\">\n<div class=\"e25149-4 x-text x-text-headline\">\n<div class=\"x-text-content\">\n<div class=\"x-text-content-text\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/aside>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Live Hacking Live Hacking is one of the most impressive and entertaining ways to demonstrate how easy it is for criminals to gain access to third party data or to spy on others. As a stand-alone event or integrated into your regular meetings \u2013 live hacking is the ideal tool for sustainably increasing security awareness [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":15265,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-11762","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=11762"}],"version-history":[{"count":1,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11762\/revisions"}],"predecessor-version":[{"id":61143,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11762\/revisions\/61143"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/15265"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=11762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}