{"id":16167,"date":"2021-07-07T16:54:24","date_gmt":"2021-07-07T14:54:24","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-research\/"},"modified":"2023-09-29T12:12:24","modified_gmt":"2023-09-29T10:12:24","slug":"security-research","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-research\/","title":{"rendered":"Security Research"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" background_image=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd-herolab-header-steuerkreis.jpg\" custom_padding=\"83px||83px||true|false\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_text_color=\"#86CCCF\" global_colors_info=\"{}\"]<\/p>\n<h1>Security Research<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"#2E353D\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"|auto|55px|auto||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<span>IT security research is just as important to our work as the exchange of knowledge with the security community. After all, more security can only be achieved if many people take on the task. We bear responsibility. We share the knowledge we gain in our practical work and through our research with the security community in public events held in the\u00a0<\/span><a href=\"https:\/\/www.usd.de\/en\/cst-academy\/\" target=\"_blank\" rel=\"noopener\">CST Academy<\/a><span>,\u00a0\u00a0<\/span><a href=\"https:\/\/www.usd.de\/en\/cst-academy\/events\/\" target=\"_blank\" rel=\"noopener\">training courses<\/a><span>\u00a0and\u00a0<\/span><a href=\"\/en\/security-advisories\/\">publications<\/a><span>. We are investing in young talent. Therefore, we maintain numerous partnerships with universities and educate young people about IT security with a practical approach in seminars and lectures. Our cooperation partners include\u00a0<\/span><a href=\"http:\/\/www.goethe-university-frankfurt.de\/en?locale=en\" target=\"_blank\" rel=\"noopener\">Goethe University Frankfurt<\/a><span>,\u00a0<\/span><a href=\"https:\/\/www.tu-darmstadt.de\/index.en.jsp\" target=\"_blank\" rel=\"noopener\">Technical University of Darmstadt<\/a><span>,\u00a0<\/span><a href=\"https:\/\/h-da.com\/\" target=\"_blank\" rel=\"noopener\">University of Applied Sciences Darmstadt<\/a><span>,\u00a0<\/span><a href=\"https:\/\/www.hs-mainz.de\/en\/\" target=\"_blank\" rel=\"noopener\">University of Applied Sciences Mainz<\/a><span>\u00a0and the\u00a0<\/span><a href=\"https:\/\/www.tum.de\/en\/\" target=\"_blank\" rel=\"noopener\">University of Applied Sciences Munich<\/a><span>. Always in the name of our mission: \u201cmore security\u201d.<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"|auto|55px|auto||\" global_colors_info=\"{}\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd-herolab-security-research-I.jpg\" title_text=\"usd-herolab-security-research-I\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_2_text_color=\"#86CCCF\" custom_margin=\"||19px|||\" global_colors_info=\"{}\"]<\/p>\n<h2>Our Responsibility<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3><span>Responsible Disclosure<\/span><\/h3>\n<p><span>Handling the results of our work in a responsible way is our highest priority. We\u2018ve taken a long, hard look at what this means for our behavior. We use a well-structured model of responsible disclosure to report vulnerabilities.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/responsible-disclosure\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"|auto|55px|auto||\" global_colors_info=\"{}\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_2_text_color=\"#86CCCF\" custom_margin=\"||19px|||\" global_colors_info=\"{}\"]<\/p>\n<h2>Knowledge from our Research<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>usd HeroLab Security Advisories<\/h3>\n<p><span>We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues \u2013 always in line with our Responsible Disclosure Policy.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-advisories\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd-herolab-security-research-II.jpg\" title_text=\"Busy colleagues analyzing computer code\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row module_id=\"engagement\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p>\n<h2>Commitment to teaching<\/h2>\n<p>Our experienced security analysts teach the course \u201cHacker Contest\u201d at the<span>\u00a0<\/span><a href=\"https:\/\/www.tu-darmstadt.de\/index.en.jsp\" target=\"_blank\" rel=\"noopener\">Technical University Darmstadt<\/a><span>\u00a0<\/span>and the<span>\u00a0<\/span><a href=\"https:\/\/www.h-da.com\/\" target=\"_blank\" rel=\"noopener\">University of Applied Sciences Darmstadt<\/a>. During the course students have the opportunity to experience IT security in practice. The usd HeroLab\u2018s own<span>\u00a0<\/span><a href=\"\/en\/our-pentestlab\/\">PentestLab<\/a><span>\u00a0<\/span>provides the technological basis.<\/p>\n<p>usd AG also cooperates with<span>\u00a0<\/span><a href=\"http:\/\/www.goethe-university-frankfurt.de\/en?locale=en\" target=\"_blank\" rel=\"noopener\">Goethe University Frankfurt<\/a>,<span>\u00a0<\/span><a href=\"https:\/\/www.hs-mainz.de\/en\/\" target=\"_blank\" rel=\"noopener\">University of Applied Sciences Mainz<\/a><span>\u00a0<\/span>and the<span>\u00a0<\/span><a href=\"https:\/\/www.tum.de\/en\/\" target=\"_blank\" rel=\"noopener\">University of Applied Sciences Munich<\/a>.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=\"Learn more\" _builder_version=\"4.21.0\" _module_preset=\"default\" button_url=\"https:\/\/www.usd.de\/en\/category\/events-community-en\/\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"55px|auto|55px|auto|true|\" global_colors_info=\"{}\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd-herolab-security-research-III.jpg\" title_text=\"Business People Meeting Eating Discussion Cuisine Party Concept\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_2_text_color=\"#86CCCF\" custom_margin=\"||19px|||\" global_colors_info=\"{}\"]<\/p>\n<h2>Events for the Community<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<p><span>Hacker Days, Hero Nights, Cyber Security Forums or IT Security Seminars. We share our knowledge and best practices with others. Visit our CST Academy websites for more information.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/cst-academy\/events\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" header_3_text_color=\"#FFFFFF\" global_colors_info=\"{}\"]<\/p>\n<h2>References &amp; Articles<\/h2>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Success Stories<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>More security for patient data: Pentest and cloud audit at medavis<\/h3>\n<div class=\"x-text\">\n<p>The protection of patient data is a top priority for medavis. That\u2019s the reason why they ordered a check of the IT security level of the entire cloud infrastructure in addition to the pentest.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/more-security-for-patient-data-pentest-cloud-audit-at-medavis\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" header_3_text_color=\"#FFFFFF\" custom_margin=\"83px||20px||false|false\" global_colors_info=\"{}\"]<\/p>\n<h2>Interviews<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>\u201eMade by usd HeroLab\u201c<\/h3>\n<p><span>Tools \u201cmade by usd HeroLab\u201d. We asked what developments the recent years have brought and how they contribute to increasing the quality and efficiency of the usd HeroLab.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-experteninterview-usd-herolab-tools\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Top 5 quality criteria for an approved scanning vendor<\/h3>\n<p><span>The five most important characteristics you should consider when choosing your PCI scanning partner.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-top-5-quality-criteria-for-an-asv\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Bug Bounty Programs<\/h3>\n<p><span>Bug Bounty Programs \u2013 a security building block that leverages the security awareness and expertise of an entire community.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/expert-interview-bug-bounty-programs\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" header_3_text_color=\"#FFFFFF\" custom_margin=\"83px||20px||false|false\" global_colors_info=\"{}\"]<\/p>\n<h2 class=\"h-custom-headline h2\">Pentest \u2013 What you should know<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Pentests: Start planning with these 4 questions<\/h3>\n<p><span>Planning penetration tests, or pentests for short, can become very complex at times. In the following, we provide you with tips that have proven to be effective in our pentest planning \u2013 based on simple questions.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-pentest-planning-tips\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>usd Orangebox makes remote pentests simple<\/h3>\n<p><span>What if an on-site pentest is not possible, but the systems within the scope are located in the internal network? By using the usd OrangeBox, remote pentests can be performed more efficiently and securely.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-remote-pentests-via-usd-orangebox\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Pentest scope: how to determine the testing scope?<\/h3>\n<p><span>Which preparation steps guarantee a pentest optimally tailored to your company? Start your pentesting project well prepared.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-pentest-scope\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Pentest analysis approaches<\/h3>\n<p><span>Learn more about the different pentest analysis approaches, how they vary and how they reflect different motivations and possibilities of an attacker.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-pentest-analysis-approaches\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Top 7 quality criteria for a pentest partner<\/h3>\n<p><span>Penetration tests are one of the most effective security analysis methods. Read here which criteria you should consider when choosing your pentest partner.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-quality-criteria-for-a-pentest-partner\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" header_3_text_color=\"#FFFFFF\" custom_margin=\"83px||20px||false|false\" global_colors_info=\"{}\"]<\/p>\n<h2>Articles<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Unknown vulnerabilities \u2013 responsibilities of the finder<\/h3>\n<p>usd AG accepts responsibility and takes the responsible handling of newly-discovered security vulnerabilities very seriously. Read more about our process of responsible disclosure here.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-what-is-responsible-disclosure\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Code Review<\/h3>\n<div class=\"x-text\">\n<p><span>What If a Gateway for Hackers Was Hidden in Your Source Code? In a Code Review, the supreme discipline of security analyses, the source code of an application is examined.<\/span><\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-supreme-discipline-code-review\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Open source tool \u201cbring2lite\u201d<\/h3>\n<div class=\"x-text\">\n<p><span>Open source tool for forensic data analysis at DFRWS USA, one of the leading conferences on digital forensics.<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/news-tool-for-forensic-data-analysis-at-dfrws-usa-2019\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Cyber security transformation chef (CSTC)<\/h3>\n<div class=\"x-text\">\n<p>usd Herolab proudly presents the CSTC, which is a Burp Extension for various input transformations. It implements a generic way to replace the need for numerous specialized extensions.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/news-cyber-security-transformation-chef\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>usd HeroLab at DEF CON 27<\/h3>\n<div class=\"x-text\">\n<p><span>usd HeroLab presents the self-developed plugin CSTC for Burp Suite at DEF CON 27, one of the largest IT security conferences in the world.<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/news-usd-herolab-at-def-con-2019\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>How a vulnerable picture upload can be exploited using manipulated picture files<\/h3>\n<div class=\"x-text\">\n<p>This article describes an attack which circumvents weak file name restrictions and injects PHP code through a resizing and metadata stripping process.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/how-to-exploit-a-vulnerable-picture-upload-using-manipulated-pictures\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security ResearchIT security research is just as important to our work as the exchange of knowledge with the security community. After all, more security can only be achieved if many people take on the task. We bear responsibility. We share the knowledge we gain in our practical work and through our research with the security [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16167","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16167"}],"version-history":[{"count":3,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16167\/revisions"}],"predecessor-version":[{"id":20932,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16167\/revisions\/20932"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}