Open in app

Sign In

Write

Sign In

Andreas Wienes
Andreas Wienes

76 Followers

Home

About

Published in

OTTO Tech

·Pinned

YesWeHack and OTTO stage Live Bug Bounty Hunting event

At this year’s Nullcon Berlin, the international IT security conference that brings hundreds of top experts together, we staged a live Bug Bounty Hunt together with YesWeHack, a leading provider of bug bounty services. Around 40 crack security researchers pitched in to subject OTTO’s infrastructure security to a hardcore test…

Bug Bounty

3 min read

YesWeHack and OTTO stage Live Bug Bounty Hunting event
YesWeHack and OTTO stage Live Bug Bounty Hunting event
Bug Bounty

3 min read


May 25

Bedrohungsanalyse - Eine kurze Einführung in das Threat Modeling

In unserer vernetzten Welt sind Unternehmen und Organisationen zunehmend der Gefahr von Cyber-Bedrohungen ausgesetzt. Eine Methode, um die Sicherheit von Systemen zu stärken und potenzielle Schwachstellen zu identifizieren, ist das Threat Modeling, also die Bedrohungsanalyse. …

Threat Modeling

3 min read

Bedrohungsanalyse — Eine kurze Einführung in das Threat Modeling
Bedrohungsanalyse — Eine kurze Einführung in das Threat Modeling
Threat Modeling

3 min read


May 23

Building a Smart Home Energy Monitoring System — My Journey with Docker, InfluxDB, and Grafana

In my quest to monitor and optimise my home’s solar energy system, I ventured into the world of Docker, InfluxDB and Grafana. With little prior knowledge of these technologies, I was determined to learn and apply them to create a smart home energy monitoring system. This article describes my experiences…

IoT

4 min read

Building a Smart Home Energy Monitoring System — My Journey with Docker, InfluxDB, and Grafana
Building a Smart Home Energy Monitoring System — My Journey with Docker, InfluxDB, and Grafana
IoT

4 min read


Feb 26, 2021

30 Days of AWS — A new Challenge

Before starting with the OSWE certification in April this year, I need to improve my knowledge and skills regarding AWS and DevOps. Therefore I will start with a new challenge from today on called 30 Days of AWS. My main goal is to understand the services provided by AWS and…

AWS

1 min read

AWS

1 min read


Dec 29, 2020

What I’ve learned during my Rookie Year in Cyber Security

My Starting Point One year ago I finally decided to make a dream come true for myself and to get into the field of cyber security. …

Cybersecurity

7 min read

What I’ve learned during my Rookie Year in Cyber Security
What I’ve learned during my Rookie Year in Cyber Security
Cybersecurity

7 min read


Dec 28, 2020

Ultimate OSCP Write-Up Collection

There are dozens of OCSP write-ups and guides out there, which are really helpful as preparation for passing the OSCP exam. This is a collection of my favourites: Passing OSCP 59 Hosts to Glory The total OSCP Guide OSCP Developing a Methology Tips for success in PWK (OSCP) My OSCP…

Oscp

1 min read

Oscp

1 min read


Dec 15, 2020

The Ultimate Cybersecurity Readinglist for 2021

Cybersecurity is a broad field with lots of interesting topics. Sometimes it’s hard to find the best source for digging further into a certain field — something like a guide for the InfoSec jungle. This articles tries to solve that issue by providing a list of go to books, you…

Cybersecurity

8 min read

The Ultimate Cybersecurity Readinglist for 2021
The Ultimate Cybersecurity Readinglist for 2021
Cybersecurity

8 min read


Nov 15, 2020

Analyzing Honeypot Data after 2 Weeks

Two weeks ago I started a little experiment and set up the T-Pot honeypot collection on an AWS EC2 instance. This article describes what I’ve learned out analysing the collected data. So much Noise 995,173 attacks against my server after 14 days! — There is a lot of background noise caused by fully…

Cybersecurity

5 min read

Analyzing Honeypot Data after 2 Weeks
Analyzing Honeypot Data after 2 Weeks
Cybersecurity

5 min read


Nov 3, 2020

Setting up T-Pot in AWS Cloud (2020)

What is T-Pot? T-Pot is a collection of dockerized versions of 18 honeypots (in T-Pot version 20.06) in combination with some powerful tools like the ELK stack for beautiful visualisation of all events captured by T-Pot. Why is it of interest? T-Pot is an easy way to collect all kind of information about ongoing cybersecurity threats without the…

Infosec

6 min read

Setting up T-Pot in AWS Cloud (2020)
Setting up T-Pot in AWS Cloud (2020)
Infosec

6 min read

Andreas Wienes

Andreas Wienes

76 Followers

Well known secret superhero - Cybersecurity enthusiast #OSCP #CEH 🧙‍♂️

Following
  • @cryptax

    @cryptax

  • Ruining All My Branding

    Ruining All My Branding

  • OTTO Tech

    OTTO Tech

  • Craig Hays

    Craig Hays

  • Vickie Li

    Vickie Li

See all (92)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams