Decrypting company security

We have a couple of tricks up our sleeves to uncover potential security breaches.

HACKNER Security Intelligence GmbH are a team of experienced and very specialised white-hat hackers. We are dedicated to challenge your state-of-the-art security system and work together with you and your team to improve it and prepare it for the future.

With years of experience, we seek the most challenging tasks and love to see our customers develop their security measures and knowledge in all areas, including IT security, physical security as well as social engineering.

Our services

Red
Teaming

Penetration
Testing

Social
Engineering

Physical
Security Test

Offensive Security Certified Expert (OSCE)
Offensive Security Certified Professional (OSCP)
Certified Professional Penetration Tester (eCCPT v2) Logo
Zero-Point Security Red Team Ops 1 Logo
GIAC Penetration Tester Certification (GPEN) Logo
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Logo
Certified Azure Red Team Professional (CARTP) Logo
ÖNORM A7700 Auditor Logo
OffSec Experienced Penetration Tester (OSEP) Logo
OffSec Exploit Developer (OSED) Logo
Burp Suite Certified Practitioner Logo
Offensive Security Web Export (OSWE) Logo
Offensive Security Exploitation Expert (OSEE)
Offensive Security Certified Professional Plus (OSCP+)
friendly man in sweater

After all, securitydoesn’t happenby accident.

three employees of Hackner Security Intelligence GmbH smiling
two men in sweaters standing in the office looking friendly at the camera

News

ISO/IEC 27001 Audit 2025

Last year, we embarked on a journey to confirm our commitment to keep the highest standards. This applies not only to the service we provide to our customers through our offense services, but also to ...

Read more

Stealth Implant Development – Bachelor Thesis Project at FH OÖ Hagenberg

Developing a stealth implant to maintain controlled access within a target network represents a technical and key challenge for red team assessments, but it is feasible. Andreas demonstrated this in h...

Read more

IKT Security Conference 2025

HACKNER Security Intelligence was once again represented with a booth at the IKT Security Conference, from June 25th to 26th, and in the ACSC (Austrian Cyber Security Challenge) by our colleague Marti...

Read more

References & Case Studies

Energy Energy Icon

The Pitfalls of Cross-Site Request Forgery

Web Application Pentesting

Two web applications were tested for a company in the energy sector. The focus was on attack options for internal and external accounts within the web applications.

Several cross-site request forgery vulnerabilities were identified during the test within the web applications. With CSRF attacks, commands can be executed in the context of the victim if the victim clicks on a manipulated link.  This allows a CSRF attack to change an account password on both internal and external registered users. If successful, this would result in the victim's account being completely compromised.

To prevent CSRF attacks, it must be impossible to prepare a valid request to the web application in advance. This is usually ensured with a random value that changes with every call and is validated on the server side with every received request.

Health Health Icon

How Forgotten Functionalities Can Endanger Data Security

Backup Infrastructure Pentesting

A company in the healthcare sector wanted to subject its internal backup infrastructure to a security check. The goal of this test was to check the configuration of the services and the servers belonging to the backup infrastructure. 

During the check, port 161/tcp was identified on which an SNMP endpoint was running. Additionally, it was possible to use the community string “public” to find out information about account names, the running services as well as the operating system. The identified operating system version was Microsoft Windows CE version 6.0 (Build 0). This embedded version of the Windows operating system was released in 2006 and has been end-of-life since 2022. An increased risk for this system was identified in connection with other open ports and associated vulnerabilities. Since this was concerning a disk management system, successful attacks could provide access to the company's sensitive data.

It was recommended to shut down services that are no longer in use. During penetration tests, we often find that some endpoints that were in use years ago are no longer being used, but still have the same configuration. If these endpoints are still used, for example to send information about the system to a monitoring application, the service must be secured to prevent third parties from reading the information. We also recommended keeping all systems up-to-date in order to neutralize known vulnerabilities via security patches. In this specific case, the accessibility of the services was additionally restricted at the network level to minimize the risk.

IT Service IT Services Icon

Re-Checks in Pentesting: The Key to Finding What You Missed

Penetration Testing und Security Review

A security recheck was carried out by us for a global corporation with focus on an application that visualizes complex data structures.

A penetration recheck (or retest) verifies that the security vulnerabilities identified during an initial penetration test have been fixed. After the company has made corrections, the testers check the same areas again and determine whether the previously exploited vulnerabilities are now secure. This recheck ensures that the remediation was effective and that new vulnerabilities were not inadvertently introduced. Rechecks are essential for maintaining security posture and compliance as they confirm that the risk level has been reduced. Without rechecks, unresolved vulnerabilities could persist, leaving systems unprotected and negating the goals and investments of the original security review.

After the initial recheck, the parts of the application that had no vulnerabilities in the previous penetration test were also examined. Several Reflected Cross-Site Scripting (XSS) vulnerabilities were identified, which would allow attackers to perform operations in the victim's context if a victim clicked on a manipulated link. In order to prevent injection vulnerabilities, such as XSS, it is recommended to verify any input to the application and to remove the special characters.

Academy

Specialized Trainings

Gain advantage by having the right information at hand and being able to react faster and more precisely. We offer you all our knowledge in form of trainings customised to your specific needs. Get the knowledge to challenge yourself

Read more

Speaking Engagements

Increasing awareness and fostering preparedness for the future are integral parts in creating a more secure working environment. We are dedicated to supporting your mission by offering speaking engagements with live hacking top-of-the-line security defences and discussing possible defence strategies.

Read more