{"id":3242,"date":"2022-12-31T11:16:32","date_gmt":"2022-12-31T10:16:32","guid":{"rendered":"https:\/\/laokoon-security.com\/?p=3242"},"modified":"2024-12-05T11:08:57","modified_gmt":"2024-12-05T10:08:57","slug":"andreas-krueger-as-a-guest-on-breach-fm","status":"publish","type":"post","link":"https:\/\/laokoon-security.com\/en\/andreas-krueger-zu-gast-bei-breach-fm\/","title":{"rendered":"Andreas Kr\u00fcger as a guest on Breach FM"},"content":{"rendered":"<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b4aebb85 wp-block-group-is-layout-flex\" style=\"margin-top:100px;margin-bottom:100px;padding-right:20px;padding-left:20px\">\n<div id=\"contentbox-main-container\" class=\"wp-block-group contentbox-main-container lk-post-content wp-container-content-663c14dd is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-fca2effe wp-block-group-is-layout-flex\" style=\"padding-right:60px\">\n<h2 class=\"wp-block-heading\">Andreas Kr\u00fcger as a guest on the IT security podcast Breach FM<\/h2>\n\n\n\n<p>Andreas Kr\u00fcger, Managing Partner of Laokoon Security, was a guest on the IT Security Podcast at the end of the year <a href=\"https:\/\/breachfm.transistor.fm\/\" target=\"_blank\" rel=\"noopener\">Breach FM<\/a>.<\/p>\n\n\n\n<p>The hosts <a href=\"https:\/\/www.linkedin.com\/in\/robert-wortmann-28091315a\/\" target=\"_blank\" rel=\"noopener\">Robert Wortmann<\/a> and <a href=\"https:\/\/www.linkedin.com\/in\/kim-nowak-082720255\/\" target=\"_blank\" rel=\"noopener\">Kim Nowak&nbsp; <\/a>are IT security experts at the provider of IT security solutions <a href=\"https:\/\/www.trendmicro.com\/de_de\/business.html\" target=\"_blank\" rel=\"noopener\">Trend Micro<\/a>. However, according to their own statement, they do not get beyond the role of observer in red teaming assessments, which is why they invited an expert on this topic for the final episode of 2022 entitled \"Code Red\": Andreas Kr\u00fcger, master of his trade, experienced red teamer and a suitable contact person when it comes to red teaming.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/AK-BlackBG-scaled-1-683x1024.webp\" alt=\"AK BlackBG scaled 1\" class=\"wp-image-1103\" style=\"width:227px;height:auto\" srcset=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/AK-BlackBG-scaled-1-683x1024.webp 683w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/AK-BlackBG-scaled-1-200x300.webp 200w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/AK-BlackBG-scaled-1-768x1152.webp 768w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/AK-BlackBG-scaled-1-1024x1536.webp 1024w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/AK-BlackBG-scaled-1-1366x2048.webp 1366w, https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/AK-BlackBG-scaled-1.webp 1707w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><figcaption class=\"wp-element-caption\">Andreas Kr\u00fcger<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is the difference between penetration testing and red teaming?<\/h2>\n\n\n\n<p>You could quickly tell that the two hosts meant business from the question:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How do you become a Red Teamer?<\/li>\n\n\n\n<li>What is the difference between vulnerability analyses, penetration tests and red teaming?<\/li>\n\n\n\n<li>What tools does a Red Teamer use?<\/li>\n\n\n\n<li>Which programming languages does a Red Teamer need to know?<\/li>\n<\/ul>\n\n\n\n<p>These and many other questions were answered in the podcast. It also became clear that a single episode on Red Teaming is by no means the end of the story. The range of topics is diverse and so there may soon be a reunion on topics such as purple teaming, the role of the white team and many other interesting topics.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">To the episode of the IT security podcast Breach FM<\/h2>\n\n\n\n<p>The episode \"Code Red\" of the IT security podcast Breach FM is available on all known podcast channels.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/open.spotify.com\/show\/4ooV9mM8Qiyfkj9jUkdZjj\" target=\"_blank\" rel=\"noopener\">Spotify<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/podcasts.apple.com\/de\/podcast\/breach-fm-der-infosec-podcast\/id1641279793\" target=\"_blank\" rel=\"noopener\">Apple Podcast<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/podcasts.google.com\/feed\/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL2JyZWFjaC1mbS1kZXItaW5mb3NlYy1wb2RjYXN0?sa=X&amp;ved=0CAMQ4aUDahcKEwjQ5JG8hZ38AhUAAAAAHQAAAAAQAQ\" target=\"_blank\" rel=\"noopener\">Google Podcasts<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/breachfm.transistor.fm\/\" target=\"_blank\" rel=\"noopener\">Website of the podcast<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Red Team provider Laokoon Security<\/h2>\n\n\n\n<p>Laokoon Security is a trusted provider of high-quality Red Teaming Assessments. <a href=\"https:\/\/laokoon-security.com\/en\/service\/red-teaming\/\">Red Teaming<\/a> is the supreme discipline in the field of offensive security and requires specialised knowledge that goes far beyond the requirements of a \"normal\" penetration tester.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group sticky-cta-box lk-toc has-contrast-background-color has-background wp-container-content-2f62e668 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-81a55a68 wp-block-group-is-layout-flex wp-container-1 is-position-sticky\" style=\"border-radius:10px;margin-top:30px;padding-top:10px;padding-right:20px;padding-bottom:10px;padding-left:20px\">\n<div id=\"toc\">\n<h6>Table of contents<\/h6>\n    <\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Andreas Kr\u00fcger was a guest on the Breach FM podcast and answered a wide range of questions about being and working as a Red Teamer. <\/p>","protected":false},"author":3,"featured_media":1103,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,9,10,12,14],"tags":[],"class_list":["post-3242","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-success-story","category-hacker","category-presse","category-red-teaming","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/posts\/3242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=3242"}],"version-history":[{"count":4,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/posts\/3242\/revisions"}],"predecessor-version":[{"id":3925,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/posts\/3242\/revisions\/3925"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media\/1103"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=3242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/categories?post=3242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/tags?post=3242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}