Hayk Gevorgyan

Hayk is a seasoned penetration tester and red teamer at PwC, with over five years of experience in offensive security.
His work spans complex adversary simulations, assumed breach scenarios, and stealth operations targeting modern enterprise environments.
Driven by a strong curiosity for hardware hacking, Hayk has explored topics like SPI/I2C bus sniffing and BitLocker key extraction, expanding red team capabilities beyond traditional boundaries.


Sessions

10-23
10:45
30min
Field guide to physical attacks against full-disk encryption
Edouard D'hoedt, Hayk Gevorgyan

How safe is your “encrypted” laptop when someone walks off with it?

Full-disk encryption (in particular BitLocker) is now standard on Windows 11 machines, silently protecting everything from corporate endpoints to personal devices. But in the real world, does it truly hold up against physical access attacks?

This session is for defenders, red teamers, and anyone who’s ever been handed a laptop and told, “Don’t worry, it’s encrypted.”

topic: hack.lu
Europe
10-23
14:15
120min
Hands-On Hardware Hacking: Extracting Keys and Owning Encrypted Laptops
Edouard D'hoedt, Hayk Gevorgyan

This hands-on workshop complements the talk “Field Guide to Physical Attacks Against Full-Disk Encryption” by guiding participants through a full-chain compromise of a BitLocker-protected Windows system. This isn’t just about sniffing keys, it’s about turning physical access into full control.

Participants will:
- Learn to use a logic analyzer to intercept TPM traffic to extract encryption keys,
- Use those keys to unlock the disk and access system data,
- And escalate privileges to achieve full interactive access on the target machine.

Attendees will walk away having executed every stage of the attack chain, from signal capture to full compromise, on real hardware!

topic: hack.lu
Vianden & Wiltz