Overview:
This one-day workshop is designed for beginners with foundational penetration testing experience, providing a comprehensive introduction to Covert Methods of Entry (CMoE), Red Teaming, and fundamental social engineering techniques. Participants will explore essential skills such as bypassing physical security, manipulating RFID, deploying covert implants, and conducting Wi-Fi attacks. By the end of the day, attendees will have hands-on experience with various tools—including the Flipper Zero, Proxmark, Key Croc, and Rubber Ducky—and will understand how to apply these tools ethically and strategically during Red Team Operations.
- Fundamentals of Physical Covert Entry: Understand the principles behind physical covert entry, focusing on lock vulnerabilities and common bypass techniques.
- Hands-On RFID Manipulation: Learn how to clone and emulate RFID cards using Proxmark and Flipper Zero, gaining insight into weaknesses in common access control systems.
- Using Covert USB Implants: Hands-on experience deploying USB-based implants, including the Key Croc and Rubber Ducky, to demonstrate the risks of physical USB access in corporate environments.
- Wi-Fi Attack Techniques: Gain foundational skills for Wi-Fi exploitation, including reconnaissance, deauthentication, and cracking WPA/WPA2 passwords.
- In-Person Social Engineering Tactics: Develop social engineering strategies to bypass human security controls, using pretexts, props, and persuasive techniques to gain unauthorized access.
- Adversarial Mindset Development: Cultivate an adversarial mindset by viewing security controls—both physical and digital—as challenges to overcome.
Student Skill Level Requirement:
This workshop is designed for individuals with foundational penetration testing experience. Participants should be familiar with:
- Basic penetration testing methodologies.
- Networking and basic security principles.
- Familiarity with common hacking tools and frameworks.
- Interest in learning physical security weaknesses and social engineering strategies.
- Ability to use common tools for hacking and bypassing.
What to Bring:
- Laptop: Participants are required to bring a laptop for exercises involving Wi-Fi attacks and RFID manipulation.
- Tools Provided: Lock picking kits, RFID tools (Proxmark, Flipper Zero), and USB implants (Key Croc, Rubber Ducky) will be available, however participants are encouraged to bring their own tools if available.
Target Audience:
This workshop is intended for entry-level individuals with basic penetration testing experience who are looking to expand into physical security, Red Teaming, and Operational Technology (OT) environments. Ideal participants include:
- Those with foundational knowledge of ethical hacking, penetration testing, and basic networking principles.
- Individuals interested in understanding and applying covert entry techniques in both traditional IT and OT environments.
- Aspiring Red Teamers, security analysts, and IT/OT professionals who want practical skills in physical bypass, social engineering, and exploiting digital vulnerabilities.
This course is especially beneficial for those wishing to learn how physical, social, and technical tactics intersect within IT and OT systems to identify and exploit security weaknesses
David Probinsky is a seasoned Red Teamer with over 10 years of experience in IT and cybersecurity. He holds certifications such as Network+, Security+, PenTest+, eJPT, among others. David is actively involved in the cybersecurity community through groups like Hack Miami (%27), InfraGard, DCG407, CitrusSec, TOOOL – Orlando Chapter, and RedTeamRD in the Dominican Republic. He has spoken at numerous international conferences, including HackMiami, BSides, Texas Cyber Summit, RedTeamRD, EkoParty, and OWASP, and has been featured on Telemundo.