BSidesLuxembourg 2025

Targeting pentesters
2025-06-18 , Main Stage

Pentesters, by the nature of their role, hold sensitive access to the information systems of their clients or employers. These accesses, their expertise, and their growing visibility within the cyber ecosystem make them prime targets for motivated attackers.


Pentesters and red teamers often focus on identifying weaknesses in others’ systems — but what about their own practices? This talk aims to turn the lens inward and critically examine the techniques, tools, and habits commonly used by us, offensive security professionals. We’ll highlight some weaknesses that can make pentesters high-value, vulnerable targets.

The goal is to initiate a conversation around operational hygiene, threat modeling, and risk awareness within the offensive security community. By identifying bad habits and systemic gaps, we hope to inspire more resilient and secure practices among those who break things for a living.

Freelance hacker. Passionate about Active Directory. Creator of The Hacker Recipes and Exegol. Speaker at BlackHat Arsenal, Insomnihack, NorthSec, MCTTP, leHACK, and more.

Freelance hacker (Pentest & Red Team). Co-creator of Exegol. Speaker at BlackHat Arsenal and NorthSec.