What is live hacking?
The aim of live hacking is to show risks, but not to discourage technology. Dealing with new digital media presents our society with a new challenge. Criminals have long been using digital structures. During a live hacking session, we will show the state of IT security and scam tricks live.
Only those who know the actions of cybercriminals can protect themselves. We do not subject our viewers to any instruction – our focus is on helping them to help themselves.
Attacks on IT security are complex.
Technical terms, numerous acronyms and IT jokes can help the content to pass the audience by – the worst case of live hacking. We want the time of live hacking to be entertaining and provide added value for everyone.
That is why over the years we have specialised in the target group-oriented communication of awareness content. We do without unnecessary details and concentrate on the most important – and are always ready to answer questions after the presentation.
Entertainment for viewers!
Our Live Hacking Scenarios
Can be displayed by one or two persons
A piece of preparation is always necessary. Our live hacking consists of modules and can therefore be scheduled flexibly. It can be targeted and tailored to the audience. The following live hacking scenarios can be presented by one or two people.
Free? But not for free!
Open hotspots are still not a standard in Germany. Internet access often hides behind so-called captive portals. But is this an indication that it is a serious hotspot? In times of increasing encryption, are there any dangers at all in public or unknown hotspots? We answer these questions with this scenario.
Surely the wrong address
If it says Google on it, it has to be Google, right? Unfortunately this is not always the case. Look-A-Like domains don’t redirect you to the destination you wanted. Where do you land? Only the attacker knows that. Do not always notice that the victim. How does he do that? We will show you that, together with possible protection and detection measures.
Does it take seconds or years?
Passwords are a big security problem. Numerous data leaks, passwords in plain text or simply guessed passwords make it very difficult for the normal Internet user to use a password correctly. We will show you how to protect your digital identity – and find out if your data has already been stolen.
The ticket to the company
They are considered a private matter and are taboo for the employer? Possible – but an attacker does not shy away from using information that is freely available on the Internet. Why Facebook, Instagram, Xing and LinkedIn are found food? This is what we show you in this scenario.
When the police calls
The telephone number is no longer a guarantee that the person on the phone is who he seems to be. In times of VoIP calling with other phone numbers is child’s play. We will show you how fraudsters use the scam and how you can protect yourself against it.
Find sensitive data easily
The most popular search engine in Germany helps to find the right websites day after day. It collects information, prepares it and serves it on the presentation plate. Why this can become a problem for your organization and how to master the Google search we will show you live.
reliable recognition and testing
The time of fraud e-mails is by no means over. On the contrary. Spam and phishing mails, which are getting better and better, hardly contain any spelling mistakes. We show why phishing mails are still a big threat and which technical and human methods the attackers use to make the mails successful.
and other wolves in sheep’s clothing
Prohibit, regulate or simply allow? Sooner or later, every organization will have to ask itself this question when it comes to handling USB sticks. In this scenario, we introduce them to the most dangerous and harmful devices. Of course we will also tell you how to handle USB sticks safely.
About the world of data & advertising
Dates are the new gold. Legal and illegal companies have long since discovered the new business model. But how much money can be earned with data? How can they be stolen and where are they distributed? You will receive answers to all these questions. Besides we make also a detour into the Darknet.
Our Live Hacking Scenarios
Can only be displayed by two persons
Some attacks can only be displayed on stage if the roles are clearly distributed. The following scenarios have shown in the past that the best way to understand an attack is to divide the roles of the presenters into perpetrators and victims. For this reason, we present the scenarios listed here exclusively in duets.
Who’s in control?
Drones are enjoying increasing popularity. The aircraft are used to inspect areas that are inaccessible to humans. In the consumer area, the devices have now also arrived. But how secure is the data on the device and how easy is it to steal a drone?
modern and safe?
Whether it’s the intelligent toy, the car or just the headset – many devices are now easily connected with the help of Bluetooth. Control, observation or standby. Comfortable, fast and safe? We show how Bluetooth connections can be infiltrated and manipulated.
we’ll crack it!
If you want to protect your account, you activate a second factor that is queried during the authentication process. Is an account safe from cybercriminals? We will demonstrate live how SMS and OTP can be cracked as a second factor and which systems are secure (at the moment).
You are interested in live hacking?
Contact us now without obligation!
+49 (0) 209 – 9596 – 766
Coming soon …
Copy & paste? Chaos!
Commands or other information are quickly copied from the Internet. However, copying and pasting from unverified sources is risky. We show when information can develop into chaos.
If hackers read along …
The Instant Messenger is the most popular in the world. Numerous functions make WhatsApp an all-round messenger. But how can attackers succeed in reading WhatsApp? We show how it works and how you can protect yourself!
The Top 10 in detail!
The OWASP Top 10 describes the most common vulnerabilities in web applications. Boring in theory – exciting in practice. We present the OWASP Top 10 live. Partially or even completely.
Impressions of the AWARE7 Live Hacking Team
Current Live Hacking Dates
Our Live Hacking Experience
Over the years we have been able to get to know numerous industries and their individual threat potential. As keynote speakers for IT security, we have already been booked for numerous different congresses and event formats. Either we presented the events in a duet or individually. Depending on the wishes of the events, we have oriented ourselves to the organiser and the format.
Many events have engaged us for a lecture in the evening, as an opening lecture or as a lecture after lunch. This happened for different reasons – in the end, however, always, among other things, because in the context of a professional lecture desire on IT-security is to be made.
From conferences for natural family planning to industry events for gardeners and landscapers. We have not only been allowed to lecture to large groups of people, we have also tailored each lecture format to the event.
In the course of research for various events, we have already been able to uncover blatant security gaps in web and mobile applications. These are reported by us to the affected companies as part of our Responsible Disclosure. Only after an ultimatum of 90 days the vulnerabilities will be published and made available to the public. We demand and promote IT security in society and are therefore committed to closing the security gaps.
With our help, we have already been able to close major security gaps in well-known online shops, contraception apps, real estate brokerage portals and other systems. These vulnerabilities were discovered during the preparation of a live hacking or in research projects and closed in cooperation with the companies and responsible persons.
Our impulse lecture
You want to arouse your audience’s interest in IT security or just show them why the topic is important?
impulse lectures usually do not last longer than 30 minutes. For the shortest IT security impulse lecture 10 minutes should be allowed. We are happy to tell you about our wealth of experience. Of course always with anonymous data and incidents.
Our Live Hacking Show
The live hacking of AWARE7 usually takes 45 – 90 minutes. Depending on the extent of the desired scenarios and questions from the audience, participants are given helpful avoidance strategies and behavioural tips. With the help of these tips, your visitors will not only recognize the known scams, but also the future scams of the scammers.
In addition, we provide tools to help participants check how vulnerable they are in the aftermath. The view for allegedly unimportant information is sharpened and a general overview is provided of which technologies can be manipulated in everyday life.
Our Awareness Training
The most comprehensive format is Awareness Training. The relevant scenarios are presented and discussed in detail over a period of four hours. Whether key users, authorised signatories or simply interested parties – after the training the participants are informed about current threats around the internet.
In this training your employees learn how hackers work – in detail. In addition to live hacking, information about attack types, attack vectors and avoidance strategies are essential components. Answering questions is mandatory.
You have specific topic requests for the event? No problem – we like to learn too! With sufficient lead time we familiarise ourselves with the subject matter and prepare individual teaching materials.
Which target group is suitable for live hacking?
AWARE7 is known throughout Germany for its flexible use for a wide variety of target groups. Our youngest audience to date has taken the place of third-class chairs. The promotion of digital education is an important concern for us. For this reason, our live hacking speakers are regularly on the road in educational institutions nationwide on behalf of initiatives. Most of these events take place in schools and are usually aimed at grades 6 – 11. The safety training for schoolchildren impresses with visual, practical presentations and explanations, as well as a reduction of necessary technical knowledge.
The oldest audience has brought their own seats as part of an introduction to iPads. We are of the opinion that those who have access to the Internet will have more chances to actively participate in society and to counteract the increasing loneliness. Technology is and always will be a means to an end.
Companies are happy to book the Live Hacking Show for their employees who have access to the computer system. For larger campaigns, the content and preparation of the content takes place in advance with the IT and Human Resources department. For the employees, the benefit is not only in the professional environment. Each participant can always take along helpful IT security tips for their private life. Nothing speaks against a mixed age group. Even if small groups (5 – 15 participants) create an optimal learning atmosphere, nothing speaks against 30 – 45 participants. With increasing size of the group however the format changes. We take out participants in smaller groups in order to carry out an exemplary social engineering attack on them. We distance ourselves from this in large groups.
Our impulse lectures and live hackings are ideally suited for executives and management. We show practical examples, if desired, which attackers can use to prepare CEO-women and to get internal information. This presentation format can be used to customize or create the appropriate policies. Attackers are not afraid to make use of all available sources. We are happy to present this – but only with express permission.
You can’t find what you’re looking for? Have your customized presentation made!
You have special wishes or want to know more about a certain topic? We are happy to offer your company tailor-made presentations, workshops and training courses. In an entertaining way, our experts will provide you and your company with the necessary specialist knowledge that will prepare you and your company for a sustainable and responsible use of new technologies.
You are looking for a crowd-puller for your exhibition stand?
Whether conference, trade fair or congress. Live hacking performances are a welcome change from the usual lecture program. The Live Hacking Shows are a crowd-puller at both IT and other events. If you want more visitors at trade fairs, a one-off or recurring Live Hack is your chance to fill your stand and draw attention to your product.
Our live hackers are not from the consultant environment.
Lecturers Live Hackers were or are research assistants at the Institute for Internet Security. Our penetration testers also hold live hackings. But the enthusiasm for the IT security of systems does not come from the growing problem of insecure IT systems. Our experts have an intrinsic motivation to deal with the matter. You can read about this on the personal blogs of the speakers or experience it in a show.