{"id":3219,"date":"2022-12-31T10:49:13","date_gmt":"2022-12-31T09:49:13","guid":{"rendered":"https:\/\/laokoon-security.com\/?p=3219"},"modified":"2024-12-05T11:02:23","modified_gmt":"2024-12-05T10:02:23","slug":"red-teamer-in-the-wdr-lokalzeit","status":"publish","type":"post","link":"https:\/\/laokoon-security.com\/en\/red-teamer-in-der-wdr-lokalzeit\/","title":{"rendered":"Red Teamer in the WDR Lokalzeit"},"content":{"rendered":"<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b4aebb85 wp-block-group-is-layout-flex\" style=\"margin-top:100px;margin-bottom:100px;padding-right:20px;padding-left:20px\">\n<div id=\"contentbox-main-container\" class=\"wp-block-group contentbox-main-container lk-post-content wp-container-content-663c14dd is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-fca2effe wp-block-group-is-layout-flex\" style=\"padding-right:60px\">\n<h2 class=\"wp-block-heading\">Red Teamer from Laokoon Security in the WDR Lokalzeit on 11 November.<\/h2>\n\n\n\n<p>To coincide with the start of the carnival season on 11 November, Moritz Samrock, Red Teamer at Laokoon Security, was able to show that hacking also has something to do with slipping into other roles.<\/p>\n\n\n\n<p>In a report for WDR Lokalzeit Bonn, filmed and produced by <a href=\"https:\/\/www.marcschroeter.de\/\" target=\"_blank\" rel=\"noopener\">Marc-Andr\u00e9 Schr\u00f6ter<\/a>he showed how easy it is to create an \"evil Wi-Fi twin\" and use it to trap guests in a coworking space in Bonn.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exciting day of filming<\/h2>\n\n\n\n<p>After an exciting day of filming, in which everything centred around the scenario on location, all the scenes were in the can and Schr\u00f6ter was able to start editing.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1183-scaled-1-768x1024.webp\" alt=\"Red Teaming\" class=\"wp-image-1098\" style=\"width:393px;height:auto\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1183-scaled-1-768x1024.webp 768w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1183-scaled-1-225x300.webp 225w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1183-scaled-1-1152x1536.webp 1152w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1183-scaled-1-1536x2048.webp 1536w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1183-scaled-1.webp 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Red Teaming<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1181-scaled-1-1024x768.webp\" alt=\"Red Team\" class=\"wp-image-1099\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1181-scaled-1-1024x768.webp 1024w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1181-scaled-1-300x225.webp 300w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1181-scaled-1-768x576.webp 768w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1181-scaled-1-1536x1152.webp 1536w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/IMG_1181-scaled-1-2048x1536.webp 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Red Team<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2022\/12\/IMG_1186-768x1024.jpg\" alt=\"Red Teamer\" class=\"wp-image-3612\" style=\"width:512px;height:auto\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2022\/12\/IMG_1186-768x1024.jpg 768w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2022\/12\/IMG_1186-225x300.jpg 225w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2022\/12\/IMG_1186-1152x1536.jpg 1152w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2022\/12\/IMG_1186-1536x2048.jpg 1536w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2022\/12\/IMG_1186-9x12.jpg 9w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2022\/12\/IMG_1186-scaled.jpg 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Red Teamer<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The Red Teaming scenario<\/h2>\n\n\n\n<p>The scenario shown represented an excerpt of a possible red teaming scenario. <a href=\"https:\/\/laokoon-security.com\/en\/service\/red-teaming\/\" data-type=\"page\" data-id=\"44\">Red Teaming<\/a> is a generic term for different approaches that are intended to replicate a real hacker attack. The aim of red teaming is not so much to find all the weak points in an infrastructure, but to focus more on recognising a real attack. Analysing the effectiveness of the measures following the detection is also on the agenda.<\/p>\n\n\n\n<p>There are many different ways of obtaining data about companies and their employees and using this information for an attack.<\/p>\n\n\n\n<p>In the scenario shown, Moritz was able to capture access data that could have been used for a follow-up attack, for example via the supply chain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Red teaming is a core competence of Laokoon Security<\/h2>\n\n\n\n<p>Red teaming is the supreme discipline in the field of offensive security and requires enormous expertise from the red teamers, which goes far beyond the knowledge of administrators and even less experienced penetration testers.<\/p>\n\n\n\n<p>Laokoon Security specialises in the implementation of <a href=\"https:\/\/laokoon-security.com\/en\/service\/red-teaming\/\">Red Teaming<\/a> and therefore a trusted provider of Red Teaming campaigns for companies with an increased level of IT security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The video on WDR<\/h2>\n\n\n\n<p>The result is a short but very informative article about the dangers of public WLAN networks and an insight into our work as hackers.<\/p>\n\n\n\n<p>Have fun watching!<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"The Hacker \/\/ WDR Television\" src=\"https:\/\/player.vimeo.com\/video\/773796205?dnt=1&amp;app_id=122963\" width=\"500\" height=\"281\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">The contribution from WDR. \"The hacker\"<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group sticky-cta-box lk-toc has-contrast-background-color has-background wp-container-content-2f62e668 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-81a55a68 wp-block-group-is-layout-flex wp-container-1 is-position-sticky\" style=\"border-radius:10px;margin-top:30px;padding-top:10px;padding-right:20px;padding-bottom:10px;padding-left:20px\">\n<div id=\"toc\">\n<h6>Table of contents<\/h6>\n    <\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>What is Red Teaming and what dangers lurk for inexperienced employees in open WLAN networks? An article about the work of Laokoon Security on WDR provides clarity.<\/p>","protected":false},"author":3,"featured_media":1098,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,9,10,12,14],"tags":[],"class_list":["post-3219","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-success-story","category-hacker","category-presse","category-red-teaming","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/posts\/3219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=3219"}],"version-history":[{"count":10,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/posts\/3219\/revisions"}],"predecessor-version":[{"id":4024,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/posts\/3219\/revisions\/4024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media\/1098"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=3219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/categories?post=3219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/tags?post=3219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}