- This event has passed.
Summit Talk: Evasive Facility Breach: From Ingress to Egress in 15 Minutes or Less
March 13 @ 12:00 pm – 12:30 pm EDT
Talk Length: 20-25 minutes
Tuition: Free
This talk is part of the The Most Offensive Con that Ever Offensived March 2024 Summit. Registration for any The Most Offensive Con that Ever Offensived March 2024 Summit class includes registration for the summit and all of its presentations, talks, and streams.
Clicking on the button above will take you
to the summit page
Pricing:
Talk Description
Dive into the world of efficient and effective evasive physical red teaming. This presentation offers a condensed glimpse into key elements covered in the full Practical Physical Exploitation course, providing attendees with insights to navigate assessments with minimal exposure while eliciting jaw-dropping client reactions. Explore topics such as Gear, Remote Recon & On-site Surveillance, Threat Profiling, Off-site Operations, and Facility Access. Join this high-impact learning experience that equips you to elevate your physical penetration testing skills. Get ready to drink from the firehose and possibly walk away with a new look at evasive facility breach tactics.
Trainer & Author
Travis Weathers is a Practice Director on Optiv’s Attack & Penetration team. Since stepping out of the military, he has worked within the offensive security space, performing advanced adversarial emulation assessments and leading offensive security practitioners. Travis is the author of Doppelgänger RFID and has spoken at various conferences, including DEF CON (RF Village), Hack Miami, B-Sides Tampa, and SourceZero Con. Additionally, Travis takes great pride in giving back to the Veteran community through mentorship.
Ralph May is a security analyst and penetration tester at Black Hills Information Security. Before joining BHIS, Ralph spent the last five years delivering penetration tests on a wide range of security assessments. These assessments include physical, wireless, network, social engineering, and full simulation red teams. Before focusing on security, Ralph worked as a system administrator and as a network engineer for both civilian and government employers. Ralph is a US Army veteran who previously worked with the United States Special Operations Command (USSOC) on information security challenges and threat actor simulations.
Ralph has contributed to multiple open-source security tools and spoken at numerous security conferences. He’s a lifelong learner and finds joy in discovering how technology truly works. When Ralph is away from the keyboard, he likes the outdoors, boating, exercising, and spending time with his family.