I am a Service and Application Engineer responsible for configuring user software and establishing data connections to LIS systems via the ASTM and HL7 protocols. Furthermore, I configure firewall appliances and migrate existing user PC systems from Windows 10 to Windows 11.
This time, I’m here to introduce lock-picking, one of my favorite hobbies. I have been a member of the OpenLocks association for more than seven years and have participated in several championships.
- I want to open a lock.
- How to open nondestructive a lock with some handy tools?
My fascination about complex systems began early on - with hacking computer games. While studying computer science at the University of Innsbruck, I discovered the Austrian Cyber Security Challenge, a capture-the-flag competition that promotes IT security talents in Austria.
My successful participation in this competition opened my way into professional IT security at the end of 2017. Since then, I have been pursuing my passion as a penetration tester. I have specialized in the field of red teaming and attack simulations through numerous further education and training courses - a field that continues to fascinate me.
I am currently deepening my knowledge in the areas of internal infrastructures and malware development. This enables me not only to increase the precision of our penetration tests, but also to implement techniques such as lateral movement, local privilege escalation and full domain compromise in red team engagements even more effectively.
- How To Breach: From Unconventional Initial Access Vectors To Modern Lateral Movement
- Essential Security Configurations and How To Exploit Them
Caffeine-based red teamer specializing in Active Directory, Windows security, and physical intrusion testing.
- Physical security assesments- what could possibly go wrong?
Fabian is a Security Consultant at SBA Research, focusing on application security from a technical and software development perspective. He is also part of the SBA's CVE Team, which discloses vulnerabilities to the public. Fabian is finishing up his Master’s degree in Logic and Artificial Intelligence at TU Wien.
- The OWASP Top 10 Looks Different From the Trenches
I'm a red teamer at slashsec since 2022 and my main focus is social engineering (especially in case of physically breaking into places), malware development and Windows security in general.
- Physical security assesments- what could possibly go wrong?
Jakob is a penetration tester and security professional from Austria. He is particularly passionate about offensive security, including network penetration testing and Windows malware development. By day he works in an internal penetration testing team, conducting and leading engagements, while at night he keeps up-to-date with new attack techniques or works on his security-focused blog.
- How I built a C2 framework from scratch and why you should(n't) do the same.
I am a master’s student at TU Wien specializing in cybersecurity. I enjoy playing CTFs and learning through hands-on challenges in web exploitation, cryptography, reverse engineering, and forensics. My interests include secure system design, vulnerability research, and cloud computing.
- From Vienna to Vegas: Lessons from DEF CON CTF with KuK Hofhackerei
Jonathan is a penetration tester at NVISO GmbH driven by curiousity who spends a lot of time digging into systems most people forgot still exist. From mainframes to IBM i, Jonathan looks for creative ways attackers can move through complex environments — and how to stop them. When not breaking things for fun (and work), he's often building out his growing homelab of classic enterprise gear to test attacks the safe way.
- z/OS for GenZ - Hack the Mainframe
Software Developer & Architect at CERT.at - Austrian National Computer Emergency Response Team. During the day, I work on notifying you about security events in Austrian Internet, and at night I experiment with honeypots and recognizing malicious Python packages. Occasionally, I even manage to go to sleep.
- Hunting Bad Snakes
Manuel Kern is a researcher and security consultant who started his career as a server admin and soon shifted his focus solely to IT security. During his time as a professional pentester at the Austrian Institute of Technology, he explored ways to improve detection methods and decided to write his Master’s thesis on efficiently detecting adversaries in computer networks. This research led him to continue his academic path, currently working on his PhD in threat detection. In his free time he is NIS and ISO27001 auditor, travels the world, is an amateur DJ and enjoys scuba diving.
- StealthCup: Red Team Evasion Attempts vs. Modern EDR/IDS/SIEM in a Multi-Stage IT/OT CTF
Manuel is a pentester, programmer and researcher for how bad those darn AI systems actually are by now. He is also part of the KuK Hofhackerei and has made sure that everybody got to this year's DefCon and back home safely.
- Hacking with AI, how to have some fun
- From Vienna to Vegas: Lessons from DEF CON CTF with KuK Hofhackerei
I am a researcher, penetration tester, red team operator, and security consultant at Trustwave SpiderLabs. I am also a cybersecurity lecturer at the University of Rzeszów in Poland and the discoverer of several CVEs mostly on leading ERP systems. I have a Ph.D. in computer science from the AGH University of Science and Technology and am an automation and robotics engineer.
- How to rob a bank using a payment terminal
Lead Penetration Tester & Cybercrime Podcast Host.
- how malicious code pwned a secure coding CTF
Old man yelling at clouds & LLMs
Graduated in mathematics
Holistic perspective on computers: former developer, sysadmin, security officer, university teacher and even computer salesman
Now a security consultant specializing in application security
Open source lover
- The TPM and You - How (and why) to actually make use of your TPM
Security researcher, long-time developer, and AppSec engineer with a focus on web security, supply chain, and AI. Passionate about IoT, electronics, and RF security.
- Sandworms in the Supply Chain: Surviving Shai-Hulud and Other Open-Source Nightmares
i love javascript, for example i love running javascript in image tags like or svgs like
ipt>alert(1)ipt>
- How To Breach: From Unconventional Initial Access Vectors To Modern Lateral Movement
- Essential Security Configurations and How To Exploit Them
Paul is a security consultant for KPMG. His training is largely in pentesting, Red Teaming and threat intelligence, but physical security has always been near and dear to his heart. He consults customers in the areas of cybersecurity, physical security and AI security.
- The Great Train Robbery - Hacking Like It's 1855
A cybersecurity consultant who challenges audiences to explore the ethical, moral, and mental health dimensions of cyber work, sparking reflection on the human choices shaping our digital world.
- Self Pwning
Stuart is a Principal Offensive Security Engineer, focusing on Red Teaming, Unix, and general Swiss Army knifery. He's been on the offensive side of public and private sector security for upwards a decade, during which time he's been an operator and trainer and developed a small arsenal of public and private offensive tools.
- Living Under the Land on Linux
Hardware, software, network, design, security. There is nothing, I do not do.
Oh, Windows, MacOS I will never use.
- I want to open a lock.
- How to open nondestructive a lock with some handy tools?