In this light-hearted session led by experienced red teamers, participants will explore the intricate world of physical security breaches in corporate settings. The presentation will focus on practical techniques like caller-ID spoofing, social engineering, and rogue device deployment, alongside undetected infiltration and objective attainment, with a little explanation for the technical concepts. Through engaging narratives, including a snowy night-time operation in a European high-security facility, the speakers will demonstrate how to navigate high-pressure scenarios. The talk aims to provide a clear understanding of physical breach dynamics, potential challenges, and their impact, empowering attendees with insights into the art of physical intrusion.
Firat Acar
Firat studied computer science in Antwerp and obtained his bachelor’s degree there. During his studies, he learned about the world of pentesting and started practicing on Hack The Box and soon went on to obtain the OSCP certification. After graduation, Firat found a job at NVISO Germany and thus moved to Frankfurt to begin his pentesting career.
After proving his knowledge and obtaining certifications, Firat moved on to the red team and is now working almost 100% on red team engagements. He has gathered a good range of experience in (TIBER) red teaming, physical breaching, and other skills related to consultancy in general.
Moritz Thomas
Moritz developed an interest in hacking computer programs & video games during his Bachelor’s computer science studies and soon acquired a distinguished set of skills in binary reverse-engineering. A few years later, he wrote his Master’s thesis about conceptualizing and implementing a modular proxy for IoT appliances at NVISO. Right after his studies, he decided to join NVISO and embark on a journey into (mostly) offensive IT security.
Today, he is a senior IT security consultant and red teamer at NVISO ARES (Adversarial Risk Emulation & Simulation) where he coordinates and participates in research & development efforts. When he isn’t infiltrating networks or exfiltrating data, he is typically knees deep in research and development, working on new techniques and tools in red teaming. Furthermore, he found a passion in public speaking and takes pride in having presented at SANS events, Sector Toronto and DEF CON.
With more than 15 years of experience in programming, 5 years in binary reverse-engineering and four years in professional offensive IT security assessments, he feels like he is just getting started!