2026-05-07 –, Main Stage
Our journey in Adversary Simulation and Red Team engagements frequently relies on attack scenarios that require physical access, or at least close proximity, to obtain an initial foothold.
To support these missions, we weaponized Raspberry Pi devices and transformed them into modular network implants tailored to our most common operational use cases.
We will look at uncommon situations where attackers have time on their side—waiting for victim devices to quietly whisper their secrets, or using physical proximity in ways that traditional controls, including MFA, were never designed to handle.
This talk presents the internal RioT project, which has been actively used by the DEEP Red Team for more than five years. We will cover its design philosophy, implemented tooling, and a survey of attack scenarios and techniques that enabled successful outcomes during real-world engagements.
Olivier joined POST Cyberforce Offensive Security team where he participated to a large variety of offensive security missions such as vulnerability research, mobile, web applications and network penetration tests, targeting telecom and banking systems, payment machines or ATMs, and also participated to several forensics investigations.
On a regular basis he also participates to the development of in-house telecom network security testing software, and assessments .
He is currently active on adversary simulation and red team engagements for DEEP, and participates to the offensive security team research & development effort.