Abstract : Penetration testing is a well-established method for assessing an organization's internal defenses. However, few engagements truly reproduce the multi-layered tactics used by real attackers. In this talk I share technical lessons from full-scope assessments that combined physical intrusion with remote compromise. I cover both attacker and defender perspectives on employee badge cloning, deployment of malicious hardware, lateral movement via repository tampering, and the design of Slack-based C2 channels.
URL:https://www.avtokyo.org/avtokyo2025/speakers