Anatomy Lesson from the Perspective of a Pentester - Guest Lecture at Johannes Gutenberg University Mainz

17. July 2024

On July 15, 2024, Matthias Goehring, Head of usd HeroLab, was invited once again to give a guest lecture for the “IT Security” class by Prof. Dr. Nicolai Kuntze at Johannes Gutenberg University (JGU) Mainz. Our colleague gave a lecture on “Professional Penetration Testing” and explained to the students of JGU Mainz that the increasing number and complexity of cyber attacks require a systematic review and protection of IT infrastructures. Pentests are an essential part of modern security strategies in order to identify and eliminate vulnerabilities before they can be exploited by attackers.

The question arose: What makes a pentest good and how should it be structured? To answer this question, Matthias began with an insight into the anatomy of a pentest. An effective penetration test requires a detailed analysis, profound technical knowledge and careful documentation of the vulnerabilities found and the proposed countermeasures. After being introduced to the theory, the students learned during the practical part of the lecture how a pentester proceeds. Initially, the focus was on the different types of technical security analyses. These range from automated vulnerability scans and manual pentests to red and purple teaming assessments. In order to identify risks in a structured manner, a combination of the various methods makes sense, with vulnerability management providing the context. The question of how the criticality of vulnerabilities can be correctly assessed was also addressed.

„We not only seek to offer students practical insights into the field of penetration testing, but also want to show them the crucial role of technical analyses in the security of modern IT systems and how they can contribute to this themselves.“

Matthias Göhring

usd AG has been committed to providing lectures, workshops and talks at various universities for many years in order to provide a practical insight into cyber security.

Also interesting:

From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings

From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings

In the dynamic field of cybersecurity, it is often the obscure and long-forgotten vulnerabilities that pose a hidden threat to otherwise hardened systems. One such vulnerability lies in invalid character encodings that violate the UTF-8 standard. While overlong UTF-8...

Categories

Categories