

Evil Twin Techniques For Real-World Exploitation
Evil Twin Techniques For Real-World Exploitation with Harold Rodriguez
Most people think of Evil Twin attacks as just fake login pages, but that's only scratching the surface. This talk dives into advanced techniques that go beyond basic credential phishing, showcasing how they can be weaponized for high-impact attacks. We'll explore the tooling, infrastructure, and attack chains needed to execute these scenarios in red team operations or simulated environments.
Harold is a hacker, red team operator, and researcher at an offensive security firm. With over 15 years in the game, he's made a habit of tearing things apart to see how they tick and how they can be exploited. Whether it's exploiting bugs in software, crafting phishing campaigns, or bending systems in unexpected ways, his focus is always on creative paths to unauthorized access.