Skip to content

Details

_MUC:SEC meetups are back on track :)

More details on how much we have missed the knowledge sharing, thought-provoking discussions and great socializing of the MUC:SEC gatherings? Sure :) But first, let us invite you on our in-person event with exciting talks and new cyber input.

QAware GmbH is our appreciated host for the evening, making sure to provide us with a comfortable venue for the talks, networking and much more :)

_What to expect?

  • Insightful topics
  • Time to socialize before and after the event at the venue

_Agenda?

  • 6.30 PM - Doors open - Grab some snacks & drinks
  • 7.00 PM - Welcome & Intro - Start of our meetup
  • 7.15 PM - Penetration testing for beginners – the Metasploit Framework and other tools, Franz Wimmer (QAware)
  • ~8.00 PM - Oblivious Pseudo-random Functions (OPRFs) - Spreading the word about a somewhat 'magical' cryptographic primitive and its applications, Tobias Reich (Airbus)
  • Afterwards: More snacks & drinks, and a time for networking with all attendees and speakers.

_More information on the talks?

  • ***Penetration testing for beginners – the Metasploit Framework and other tools*** by Franz Wimmer

No software is without a bug - but you should do your utmost to find and fix many of them - especially critical vulnerabilities. One well-known tool for penetration testing is the Metasploit framework, combining exploits for known vulnerabilities with useful payloads to actively exploit them. It also brings tools to specifically scan systems for information.
We’ll look at the features of the Metasploit Framework in detail, learn how exploits actually work, how to detect common vulnerabilities and how to actively exploit them.

@about Franz_Senior Software Engineer, #CloudNativeNerd and IT security enthusiast at QAware GmbH. He studied computer science in Rosenheim and wrote his master's thesis on big data technologies in the cloud. He also holds the lecture "Cloud Computing" at the TH Rosenheim. In his free time, he enjoys photography and mountain biking.

  • ***Oblivious Pseudo-random Functions (OPRFs) - Spreading the word about a somewhat 'magical' cryptographic primitive and its applications*** by Tobias Reich

Oblivious Pseudorandom Functions (OPRFs) have emerged as a cryptographic primitive with immense potential for enabling secure and privacy-preserving applications. We will demystify the concept of OPRFs, looking at various applications of OPRFs, including password-based key derivation, password hardening, and privacy-preserving protocols such as private set intersection. Through practical examples and real-world use cases, we will understand, how OPRFs can significantly enhance user privacy and security across different domains.
We will also briefly explore the potential of OPRFs as building blocks for constructing advanced cryptographic primitives and protocols, as well as their deployment as a kind of infrastructure service.
Whether you are a cryptography enthusiast, a cybersecurity professional, or a developer interested in privacy-enhancing technologies, this talk will provide you with some valuable insights into the staggering potential of OPRFs and their role in shaping the future of secure and privacy-preserving systems.

@about Tobias_Former IT officer and network security instructor at Bundeswehr, prior infosec consultant, now cybersecurity architect. Holds a second master degree during which he fell into the rabbit hole of applied cryptography.

_Location?
QAware GmbH, Aschauer Str. 30, 81549 Munich, is located within 20 minutes S-Bahn distance from Marienplatz or 15 minutes from Ostbahnhof (10 minutes walking distance from Giesing Bahnhof).
.
_How to participate?

  • RSVP
  • Bring your friends and
  • Tell your colleagues.

We are looking forward to an excellent event and interesting but chilled brainstorming :)

Related topics

Events in Munich
Cryptography
Cybersecurity
Penetration Testing
Software Security
Information Security

You may also like