- ❔ What: A Hack’n’Tell-like event with easy-to-digest talks presented by students and external partners. Snacks, drinks and awesome chats inclusive!
- 🕛 When: TBD
- 📍 Where: At our university right here, perfectly reachable by S7 or car from Berlin.
- 🤖 Who: Every creature is welcome! In case you are interested in presenting or sponsoring, don’t hesitate to send us an email.
Overview
Hacken und Schnacken (engl. “Hacking and Chatting”) is a Hack’n’Tell-like event with talks presented by students as well as external partners such as researchers and companies. There are usually around 5 talks per evening with time for chats as well as snacks and drinks for free (and sometimes even sponsored by our generous partners!). Each talk is about 10-30 minutes long and covers an interesting topic in the broad field of cybersecurity, be it how printers are reverse engineered to repair them, interactive penetration tests and incident response, nice backup solutions, security in git and lots of more cool topics (checkout Past Events to see them all!). The target group are primarily people from our university with a background in computer science, but everyone is welcome! The main venue provides space for about 60 guests and a nice presentation screen.
Past Events
Hacken und Schnacken is the first event we hosted as the newly founded Cybersecurity Club at our university, with the first iteration beings hosted online on 26th March 2021 while the COVID-19 pandemic was still raging.
Volume 8
Took place on-site on 26th June 2024.
- How (not) to run a pentest
- Reverse Engineering TeamViewer
- JTAG Basics - How do you debug a micro processor?
- How to find out what’s going on in security
Volume 7
Took place on-site on 24th January 2024.
- Evil Twin and Beyond: Security for authentication in WLANs
- Interactive presentation on cyber security in practice
- Effects of phishing educational content (a masters thesis)
- Don’t trust a waste ink pad that you haven’t filled yourself
Volume 6
Took place on-site on 21st June 2023.
- Why you get into the HPI buildings
- Setup not under control? - Taking over external infrastructure with OSINT
- Experiences with Pwn2Own
- An IT security buyers guide 2023
- Hacker Traffic Control: The air traffic control of the Potsdam Cyber Games
Volume 5
Took place on-site on 12th January 2023.
- WiFi meets EVPN: What does scalable WLAN infrastructure look like?
- Effective monitoring with ELK: Don’t forget the session view!
- Printers: From the computer to the crash
- Signal: How does the protocol behind the messengers work?
- Mechanisms and detection of attacks with special consideration of perpetrator profiles and attack methods
Volume 4
The first on-site H&S on 16th June 2022.
- Digital vaccination certificates (privacy-friendly & copy-proof)
- EDRs and how to trick them
- USB attack vectors
- How to deploy Linux on desktops at scale
- Deploying to a Kubernetes cluster from Slack: ChatOps ♥️ GitOps
Volume 3
Took place online on 3rd December 2021.
- CovKey
- Consensus building for blockchains
- Distributed Denial of Service
Volume 2
Took place online on 9th July 2021.
- Containers in practical use
- Manage your own data
- PAM, NSS and consorts
- git Security
- How to create your own botnet: Hacking cloud-connected IoT devices in private networks
Volume 1
Took place online on 26th March 2021.
- Practical use of OIDC
- Language of the Security Department
- The new tunnel digger: Wireguard in home use
- Spring cleaning with the DNS vacuum cleaner: Blocking advertising and tracking with Pi-hole
- TCP/IP FTW WTF - or: How to bypass iptables
- Memes and social engineering from GIZ