Security comes in many shapes and sizes and often covers more vectors than one could imagine when starting to look into a new topic. Security-Bits Labs offers affordable solutions for corner cases that usually do not scale.
(Customized | Individual | Suitable)

blurry background: white/grey

Topics & Expertise

Security isn't Security. Requirements, measures and potential issues are highly dependant on the covered attackers and the exact thing one wants to protect. At Security Bits Labs we focus on the areas of Operational Technology, Hardware, Embedded and Telecommunications. With additional experience in the railway, automative and automation sectors. This explicitly includes all those systems we know should be replaced years ago, but can't for operational reasons.
And if there's something we haven't seen before, we do have sufficient inspiration.

Trainings, Workshops
Knowledge Transfer

Security-Bits Labs offers individual knowledge transfer.
No matter if 5-minute insights, 1-hour crash courses or full day trainings. We aim understanding your challenges, the target audience and then create tailored content. Following our base principals, we try to combine content with practical challenges and demonstrations.

Test Rigs and Training Setups

Reproducability is key in many scenarios. Especially when trying to teach, a setup has to perform perfectly to allow the student to get the lesson. The same applies when performing regular tests i.e. in quality assurance. Physical setups from Security-Bits Labs offer realiability while in use and a clean way of performing resets to prepare for the next class. Aspects which can not be automated will be documented accordingly to make sure everything runs smoothly.

Concepts, Ideas, Plans and Architectures

While not aiming at typical consulting, we're happy to assist you with next to every Security challenge you might have. We will discuss, organize and moderate workshops and find a matching solution for your specific scenario. Our basic services include architectures and Security concepts. Here we mainly focus on tiny companies, simply to give back, and on very special environments like OT and critical infrastructures.
That said, we're also happy to say "no" if the expected benefit is not achievable.

Created with a bit of Madness

While attackers and researchers might be bound to plain physics, they often ignore rules, policies, laws and “the way to do something”. Their main power is the combination of creativity, lack of constraints and often time. We follow the same approaches! By thinking out of the box and adding a pinch of madness, we’ll work out the simplest solution for your challenge.

  • Custom Electronic Giveaways

    Conference badges have been a part of Security conferences for many years. In addition they're a stylish approach to recruiting. We'll assist with ideas, design and production.

  • CTF Challenges

    The closer to real world scenarios, the cooler the challenge. No matter if custom electronics or existing devices wrapped into a fun setup, we'll find a solution.

  • Not-so-Fake IDs

    One part of social engineering assignments is being convincing. And what's more convincing than your own company ID, with your name and picture, or maybe a different name and your image? Duplex prints in 600DPI, with a custom UV layer ought to help.

  • Security Concepts

    Running rare or old equippment brings a lot of challenges with it. We're happy to assist you in working out the best, most secure architecture possible.

  • One-Day-Pentests

    Looking at a new device and need to know it's not insecure? A quick One-Day-Pentest might not tell you whether a device is secure, but surely whether there are any major issues. We offer you a "first opinion" on the Security of devices and components, by just investing a single day.

  • Interested? Need Support?

    Feel free to contact us via labs [at] security-bits [dot] de.

Security-Bits Labs

Trainings, Workshops, Tools & Crazy Ideas