BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesluxembourg-2026//speaker//TGY8UJ
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-YQSRBJ@pretalx.com
DTSTART;TZID=CET:20260507T140000
DTEND;TZID=CET:20260507T144000
DESCRIPTION:Our journey in Adversary Simulation and Red Team engagements fr
 equently relies on attack scenarios that require physical access\, or at l
 east close proximity\, to obtain an initial foothold.\n\nTo support these 
 missions\, we weaponized Raspberry Pi devices and transformed them into mo
 dular network implants tailored to our most common operational use cases.\
 n\nWe will look at uncommon situations where attackers have time on their 
 side—waiting for victim devices to quietly whisper their secrets\, or us
 ing physical proximity in ways that traditional controls\, including MFA\,
  were never designed to handle.\n\nThis talk presents the internal RioT pr
 oject\, which has been actively used by the DEEP Red Team for more than fi
 ve years. We will cover its design philosophy\, implemented tooling\, and 
 a survey of attack scenarios and techniques that enabled successful outcom
 es during real-world engagements.
DTSTAMP:20260501T090318Z
LOCATION:Main Stage
SUMMARY:RioT – A Raspberry-Based Network Implant for Red Team Operations 
 - Olivier Médoc
URL:https://pretalx.com/bsidesluxembourg-2026/talk/YQSRBJ/
END:VEVENT
END:VCALENDAR
