Decrypting company security

We have a couple of tricks up our sleeves to uncover potential security breaches.

HACKNER Security Intelligence GmbH ist ein Team an erfahrenen und sehr spezialisierten White-Hat-Hacker:innen. Unsere Leidenschaft ist es, den Stand der Technik jeden Tag aufs Neue herauszufordern und Ihre Sicherheits-Systeme gemeinsam mit Ihnen und Ihrem Team auf die Zukunft vorzubereiten. 

Mit unserer jahrelangen Erfahrung freuen wir uns über ständig neue Herausforderungen und motivieren uns selbst, wenn wir zur Verbesserung der Sicherheitsmaßnahmen und des Know-hows unserer Kunden in Bereichen wie IT-Sicherheit, physische Sicherheit und Social Engineering aktiv beitragen können.

Our services

Red
Teaming

Penetration
Testing

Social
Engineering

Physical
Security Test

After all, security

doesn’t happen

by accident.

Meet the team

We visit DefCon 31

We were very happy to visit DEFCON in Las Vegas, NV, USA in August 2023 for the first time! DEFCON is an annual event which attracts up 30,000 attendees interested in the fields of Physical Secur...

Read more

Welcome to our new team members

Our team has grown and we are happy to welcome three new employees to our pentesting team. With their help, it is easier for us to respond to the many project requests we’ve had and we hope to be able...

Read more

Thomas at Treasury on Tour in Cologne

Treasury on Tour is an event by Schwabe, Ley & Greiner to bring together the leading heads of treasury with high-grade lectures, discussions and the possibility to network. HACKNER Security Intell...

Read more

See all news

References & Case Studies

Industry

This Application Test had us at the Edge of our Seats!

Industry

For a global corporation, we tested a web application and a rich client used for software development. Additionally, an agent application played an important role, which could be connected from the web and the rich client. A complex system with many components - and possibilities for security holes!

Sometimes it pays off to test an application over a longer time frame to comb through every small corner. Because during the last days of the project, we identified a vulnerability that could be exploited to run arbitrary commands on the agent software. Furthermore, it was possible to spawn and stop customer server instances in the customer's environment.

Finance

Payment Processes on a Technical Level

Finance

For a global sportswear company, the security of payment processes was assessed on three company locations. Securing the interfaces between the different payment tools is usually an underestimated attack vector in this scenario. Not many people are aware of the use of payment files (mostly XML), which contain all the bank account information, including the receiving account.

File transfer, you say? The word "interface" is not always correct in this context because the interface is a human who copies the payment file from their local work station to a network share. This leads to the files being modifiable not only during transmission but also at the location they are being stored at. Internal attackers can utilize this by changing the receiving account in the file to their own account. Depending on the receiver you could make quite some money with this trick.

But how can I prevent this? In short term it is worth to secure payment processes with available methods, meaning encryption of transmission paths and restricting file access. In the long term, this unfortunately is a more elaborate task! Structures and interfaces need to be established that prevent employees from having access to files altogether.

Government

Accessing a building through Social Engineering and CEO-Fraud

Government

To gain access to the internal network in a social engineering assessment, we first had to gain access to the company building. So we developed the following scenario and realized it: 

An employee of ours, dressed up in suit and tie, waited for their cue word in front of the company building. A second employee, out of sight, called the front desk with a faked supervisor number: "The supervisor has a very important meeting but the customer is late. When the customer arrives, they need to be let through as quickly as possible." 

The first employee of ours now ran stressed to the front desk, had no need to say much more and was allowed to pass without a control. The result: Free movement within the building!

Academy

Specialized Trainings

Gain advantage by having the right information at hand and being able to react faster and more precisely. We offer you all our knowledge in form of trainings customised to your specific needs. Get the knowledge to challenge yourself

Read more

Speaking Engagements

Increasing awareness and fostering preparedness for the future are integral parts in creating a more secure working environment. We are dedicated to supporting your mission by offering speaking engagements with live hacking top-of-the-line security defences and discussing possible defence strategies.

Read more