PinnedPublished inOTTO TechYesWeHack and OTTO stage Live Bug Bounty Hunting eventAt this year’s Nullcon Berlin, the international IT security conference that brings hundreds of top experts together, we staged a live Bug…May 17, 20231May 17, 20231
Bedrohungsanalyse — Eine kurze Einführung in das Threat ModelingIn unserer vernetzten Welt sind Unternehmen und Organisationen zunehmend der Gefahr von Cyber-Bedrohungen ausgesetzt. Eine Methode, um die…May 25, 2023May 25, 2023
Building a Smart Home Energy Monitoring System — My Journey with Docker, InfluxDB, and GrafanaIn my quest to monitor and optimise my home’s solar energy system, I ventured into the world of Docker, InfluxDB and Grafana. With little…May 23, 2023May 23, 2023
30 Days of AWS — A new ChallengeBefore starting with the OSWE certification in April this year, I need to improve my understanding regarding AWS and DevOps. Therefore I…Feb 26, 2021Feb 26, 2021
Ultimate OSCP Write-Up CollectionThere are dozens of OCSP write-ups and guides out there, which are really helpful as preparation for passing the OSCP exam.Dec 28, 2020Dec 28, 2020
The Ultimate Cybersecurity Readinglist for 2021Cybersecurity is a broad field with lots of interesting topics. Sometimes it’s hard to find the best source for digging further into a…Dec 15, 2020Dec 15, 2020
Analyzing Honeypot Data after 2 WeeksTwo weeks ago I started a little experiment and set up the T-Pot honeypot collection on an AWS EC2 instance. This article describes what…Nov 15, 2020Nov 15, 2020