Alexander Hagenah

Cyber Security Leader

I am a proven Cyber Security Leader with over a decade of multi-national (EU, Asia, Africa and Middle East) management, technical and operational leadership experience. With a uniquely broad range and depth of knowledge and experience across multiple growth sectors, specializing in Cyber Security focusing on Law Enforcement. I am recognized as being highly agile, quickly assimilating and adapting to business change while delivering best of breed solutions to the customer.

I have worked for a plethora of Law Enforcement & Government Agencies worldwide (50+ countries), including the innovation, evaluation & development of systems and solutions to address the growing criminal space in the Cyber Security area.

I am an extremely strong, influential communicator and sought presenter at conferences. Which helps me in bridging the needs of a technical team, sales requirements and C-level decision makers.

Professional Experience

05/2021 - Present

Head Cyber Controls / Director

SIX Group AG

Zurich, Switzerland

04/2017 - 04/2021

Chief Technology & Innovation Officer

FinFisher

Munich, Germany

12/2009 - 04/2017

Senior Offensive Security Specialist

FinFisher

Dubai, United Arab Emirates

2007 - 2009

Senior Offensive Security Specialist

Confidential

Dubai, United Arab Emirates

Expertise

Key Skills

Information Security, Cyber Investigations, Penetration Testing & Social Engineering, Leadership & Management, Innovation, Information Security Governance, Complex Problem Solving, Lawful Interception, Information Risk Management & Compliance.

Public Speaking

Given a few dozen talks or consulted on several conferences such as for Interpol, Europol, ISS World and others. Topics varied and were about innovative and groundbreaking Cyber investigations methods.

Innovation

Identifies, prioritizes and successfully implements innovations with the greatest impact for meeting near- and longer-term business goals.

Leadership & Management

Sophisticated people skills and ability to deal with different cultures proven by successfully leading teams across several countries. Active curiosity, open-mindedness and sensitivity to different cultures.

Projects [1998 - 2005]

BitDefender for Mail Servers Malware Detection Bypass

Vulnerability in BitDefender for Mail Servers, which can be exploited by malware to bypass detection. The vulnerability is caused due to an error when parsing attachments and can be exploited via a specially crafted UUencoded mail with multiple attachments. Successful exploitation causes malware in an attachment to pass the scanning functionality undetected. The vulnerability has been reported in engine versions 1.6.1 and prior for Linux and FreeBSD.

zigstack

zigstack is for hardening the TCP/IP Stack (e.g. against DoS-Attacks) of Windows NT, 2000, XP, 2003-based workstations and servers.

xxpoof

Spoofed Packet Generator for Windows & DDoS network testing tool.

ipcshares

ipcshares can deactivate (or activate) the so-called IPC$-shares of WindowsNT, 2000 & XP computers. Those shares are enabled by default and can pose a security risk.

igmpflood

igmpflood is a simple tool for sending malformed IGMP packets to test the hardening of a target address.

RCON plaintext password exposure

RCON protocol is used to administrate your Half-Life/Counter- Strike Server. This advisory shows that it transmits the administrator password in plaintext over the wire.

CATCHiNG THE AiR STUFF (German)

A paper describing the basics, functionalities and security weaknesses in the IEEE 802.11 (WLAN) standard. Includes a CLI wifi scanner running on Linux/UNIX.

IIS anonymous lockout

Advisory on a default account used by the Microsoft IIS webserver for anonymous access which can be locked out. With this a website can be remotely shut down.

IIS ism.dll HTR truncation

Advisory affecting Microsoft IIS webserver 4/5 by calling ISM.DLL which allows appending a set of charaters to force the webserver to display the source code of the requested file.

HYPERLiNK-SPOOFiNG (German)

This document shows an attacking technique which allows to misuse secured connection like SSL.

SNiFFiNG FAQ (German)

This document describes how network sniffing works and how it can be (ab)used.

Contact

Email
ah@primepage.de
GPG Key [0x5CE016578890129E]

-----BEGIN PGP PUBLIC KEY BLOCK-----

xjMEYG3SUhYJKwYBBAHaRw8BAQdAORwy6FlbqiqiLwthwp3FTcGIjRXyZZx2y3vK+q8iSbnNI0Fs
ZXhhbmRlciBIYWdlbmFoIDxhaEBwcmltZXBhZ2UuZGU+wpEEExYIADkWIQQNMmvEBeNyVwLtmWZc
4BZXiJASngUCYG3SUgUJA8JnAAIbAwULCQgHAgYVCAkKCwIFFgIDAQAACgkQXOAWV4iQEp7UUAD/
WIPd5IedkV2MC2ZllJzkI8FKDmuqfQbuY2ACuF8RdNkA/jzj37WA4Y8jGlONPWwPyJpEencDK+7/
wfl3NU1zfSMLzjgEYG3SUhIKKwYBBAGXVQEFAQEHQG2wHZha918K6oKGsaq3y3Np9MBRJxYJOR/d
bfcf3tMuAwEIB8J+BBgWCAAmFiEEDTJrxAXjclcC7ZlmXOAWV4iQEp4FAmBt0lIFCQPCZwACGwwA
CgkQXOAWV4iQEp6L4QEAi3O+9s0cPUc+8eW4S8gQSbPZakqntPTDMxRHvGBO/uIBALB9rEbFvpz+
Pycuhw0+69rDINJaKZ/Obu07sH47CBUD
=YCOz
-----END PGP PUBLIC KEY BLOCK-----