Vienna International Ethical Hacking Boot Camp

3rd Edition - 2025

What is the Bootcamp?

From July 4–6, 2025, TU Wien will host the third edition of the International Ethical Hacking Bootcamp — an intensive, practice-oriented training event focused on cybersecurity fundamentals, ethical hacking techniques, and real-world attack scenarios. Designed for students, young professionals, and cybersecurity enthusiasts, the program offers hands-on experience in areas such as penetration testing, vulnerability assessment, and defensive strategies.

Around 150 participants are expected, including national teams from Austria, Croatia, Czech Republic, Hungary, Slovakia, Slovenia, Serbia, Germany, Switzerland, and Italy. The bootcamp also serves as a training ground for Team Europe in preparation for the International Cyber Security Challenge 2025 in Japan and the European Cyber Security Challenge.

Led by a distinguished lineup of international experts—including sessions on hardware hacking, reverse engineering, mobile and web security, and digital forensics—the event fosters joint learning, practical skill development, and cross-border networking. A Capture The Flag (CTF) exercise on the second day, based on challenges from the Austrian Cyber Security Challenge, will emphasize collaborative problem-solving over competition.

The bootcamp continues to strengthen Vienna’s role as a hub for cybersecurity training, research, and international collaboration.

Program Overview

Day 0 - Thursday, 3rd July

18:30: come2gether - Stöckl im Park

Day 1 - Friday, 4th July

09:45 - 10:00: Opening @ Kuppelsaal
19:00: Dinner @ Campus Bräu

Day 2 - Saturday, 5th July

09:30 - 18:00: CTF @ Kuppelsaal
18:30: Dinner @ Restaurant Kugeltanz

Participants

Workshop

Thomas Weber - Friday, 4th July 10:00 - 13:00

Hardware & Firmware Hacking


Hardware Hacking Presentation & Firmware Hacking Practical Challenge (Virtualbox required). Binary exploitation & web exploitation.

Thomas Weber is co-founder and security researcher at CyberDanube in the field of embedded systems, (I)IoT and OT. He has uncovered numerous zero-day vulnerabilities and has published a large number of security advisories in the past. As part of his scientific work, he developed an emulation system for firmware – today the SaaS tool MEDUSA SFR has emerged out of this. In the past he spoke at cyber security conferences such as HITB, BlackHat, IT-SECX, HEK.SI and OHM(international). Nowadays, he brings his competence and experience into security products.

Jan Gocník - Friday, 4th July 14:00 - 16:00

Unconventional reversing


The main goal is to motivate people to not be afraid of reverse engineering and to stop staring into assembly.

Pentester, former ICC player, Team Europe trainer

Davide Maiorca - Friday, 4th July 16:00 - 18:00

Digital Forensics in CTF


The seminar provides a training on forensics-based challenges, with a particular focus on memory and disk forensics (with some details about real-world forensics). The target is beginner/intermediate players in this category. The seminar is divided into two parts: 1) a theoretical part; 2) various practical challenges (by using freely available tools such as Volatility and Autopsy).

Associate Professor at University of Cagliari (Italy), Forensics Consultant, Captain of Sardinia Len, Trainer for Team Europe and Team Italy

Philipp Beer - Sunday, 6th July 14:00 - 15:00

When the Web Meets Apps: The Security Pitfalls of In-App Browsing


This workshop focuses on the security risks introduced by mobile in-app browsers, such as WebViews and Custom Tabs. Participants will learn how these embedded browsers blur traditional web and app boundaries, leading to new attack surfaces. The session will include practical hands-on experience demonstrating how these components can be misused.

Philipp Beer is a first-year PhD student in the Security & Privacy group at TU Wien. His research explores the intersection of web and mobile security, with a particular focus on the risks introduced by integrating the web ecosystem into mobile applications.

Gabriele Digregorio - Sunday, 6th July 15:00 - 17:00

libdebug: Build Your Own Debugger


Common debuggers are primarily designed for human interaction. However, many tasks in exploitation and reverse engineering require debugging to be both programmatic and reproducible. This workshop presents libdebug, a Python library for programmatic debugging of userland binary executables. libdebug is fully open source and provides a user-friendly API for building custom debugging tools tailored to various use cases, including reverse engineering and binary exploitation. The session will cover the motivation for using a programmable debugger and demonstrate its use in real CTF scenarios through hands-on exercises based on actual challenges. A working Python environment on a POSIX-compliant Linux system with libdebug installed is required.

I'm a PhD candidate in cybersecurity at Politecnico di Milano and an active member of the Tower of Hanoi and mhackeroni CTF teams, mainly focusing on binary and, when needed, on misc challenges. I'm also a maintainer of the libdebug project.

Logistics

The hotel is located 3mins from the train station.
Check-In: 3rd July - 15:00
Check-Out: 6th July - 12:00
Training and CTF will take place at TU Wien, which is 17min from the train station to Karlsplatz with the metro or 26min walking (see on maps). Enter the main TU Wien building through the main entrance and follow signs for "Kuppelsaal".

Organizing Team

The International Hacking Bootcamp Vienna 2025 is organized by the TU Wien Cybersecurity Center in partnership with Cybersecurity Austria (CSA).
Joe Pichlmayer
CEO @ IKARUS
Founder of ACSC
Manuel Reinsperger
(aka neverbolt)
Pentest @ A1Digital
Coach Team AT
Marco Squarcina
(aka lavish)
Scientist @ TU Wien
Coach Team AT
Special thanks to:
Marco Squarcina (ctf)
Manuel Reinsperger (ctf)
Daniel Marth (ctf)
Patrick Pirker (ctf)
Marcel Schnideritsch (ctf)
Georg Felber (ctf)
Matthias Pleschinger (ctf)
Sebastian Felix (ctf)
Sebastian Dietz (ctf)
Maximilian Birnbacher (ctf)
Johannes Berndorfer (ctf)
Felix Roithmayr (ctf)
Dominik Apel (website)

With support from

Gallery (2024)