10-18, 11:30–12:20 (America/New_York), Social Engineering CTF (204)
Language: English
Physical penetration testing goes beyond firewalls and passwords—it tests the locks, the doors, the people, and the protocols. In this session, we’ll explore the art and methodology of physical pentesting, from reconnaissance and social engineering to executing real-world breach scenarios. Drawing from real case studies, I’ll walk through how attackers think, how weaknesses are exploited, and how organizations can better defend their facilities against intruders. Expect war stories, practical lessons, and insights into the psychology that makes physical pentesting both effective and risky.
Physical penetration testing goes beyond firewalls and passwords—it tests the locks, the doors, the people, and the protocols. In this session, we’ll explore the art and methodology of physical pentesting, from reconnaissance and social engineering to executing real-world breach scenarios. Drawing from real case studies, I’ll walk through how attackers think, how weaknesses are exploited, and how organizations can better defend their facilities against intruders. Expect war stories, practical lessons, and insights into the psychology that makes physical pentesting both effective and risky.
Physical penetration testing goes beyond firewalls and passwords—it tests the locks, the doors, the people, and the protocols. In this session, we’ll explore the art and methodology of physical pentesting, from reconnaissance and social engineering to executing real-world breach scenarios. Drawing from real case studies, I’ll walk through how attackers think, how weaknesses are exploited, and how organizations can better defend their facilities against intruders. Expect war stories, practical lessons, and insights into the psychology that makes physical pentesting both effective and risky.
Marco Estrela is a cybersecurity consultant with a passion for social engineering and physical security. After realizing he was better at “talking his way in” than hacking code, he moved from phishing and vishing into full-scale penetration testing. Today, he helps organizations uncover and fix their weakest entry points—whether they’re digital or locked behind a security badge. Marco is also the host of the Behind the Shield cybersecurity podcast, where he and his team break down security trend