[Speakers]
Adversary Village at
DEF CON 33

Daniel Isler

Senior Threat Intel Advisor, Team Cymru

Bachelor in Arts of Representation. With certifications in Social Engineering, Red Team & OSINT. Team Leader of Fr1endly RATs, the Social Engineering unit at Dreamlab Technologies Chile.
Specializing and developing techniques and methodologies for simulations of Phishing attacks, Vishing, Pretexting, Physical Intrusions and Red Team.

Talk: Here and Now: Exploiting the Human Layer at the Right Moment

Sunday | Aug 10th 2025
DEF CON Creator Stage 1 (Room 233) | Las Vegas Convention Center

Adversary Simulation
Adversarial Mindset

Gaining access isn’t always about having the perfect pretext. Sometimes, it’s about recognizing subtle shifts in the environment, reading behavioral cues, and adapting on the fly. The best social engineers, like master photographers, don’t just plan—they wait for the decisive moment and take action when the time is right.

This session unpacks a real-world infiltration where success wasn’t about meticulous scripting, but about understanding when and how to pivot in real time. By integrating principles from photography, literature, theater, and deception, we explore how presence, timing, and perception shape the art of infiltration.

Detailed talk outline :

Social engineering is often perceived as a game of deception, a battle of wits where the best pretext wins. But what if success has less to do with pretext and more to do with recognizing the moment? The difference between failure and access isn’t always in the plan—it’s in how well you read the environment, adapt to changes, and make the right move at the right time.

This talk will take the audience through a real-world social engineering operation, where meticulous planning was only half the equation. The real breakthrough came not from the pretext we prepared, but from an unexpected shift in the environment—one that we recognized and exploited in real time.

Through this story-driven session, we’ll explore:

  1. How social engineers identify and leverage hidden opportunities.
  2. Why a rigid plan can be a liability, and how adaptability increases success rates.
  3. The psychological and artistic principles that shape effective deception and influence.

The Story: A Real-World Infiltration

The foundation of this talk is a detailed case study of a successful infiltration. Initially, our team had a solid pretext, rehearsed interactions, fake email and well-crafted credentials. However, a subtle but critical change in the target’s environment shifted the conditions in our favor—something we wouldn’t have noticed had we been too focused on following the original plan.

We’ll walk through the key moments of the infiltration, including:

  1. The initial reconnaissance and how small environmental details reshaped the strategy.
  2. The pivot: Recognizing an opportunity in real-time and rewriting the attack on the fly.
  3. How human behavior, psychological cues, and perception gaps played a role in the success.

This isn’t just a story about breaking into a building—it’s a lesson in understanding social dynamics, adapting with precision, and turning the ordinary into the extraordinary.

The Framework: Social Engineering as an Art Form

To understand how and why these techniques work, the talk will connect social engineering tactics to broader artistic disciplines:

  1. Henri Cartier-Bresson’s “Decisive Moment” – Great photographers don’t just take pictures; they wait for the exact moment when all elements align to create the perfect shot. Social engineers do the same—timing is everything.
  2. Hemingway’s Iceberg Theory – The best narratives aren’t about telling everything; they’re about suggesting just enough for the audience to fill in the blanks. In social engineering, what we don’t say is often more powerful than what we do.
  3. Augusto Boal’s Invisible Theater – How blending seamlessly into an environment allows a social engineer to control interactions without ever raising suspicion.

By integrating these concepts, we demonstrate how pretexts become more believable, interactions feel more organic, and access is granted rather than forced.

What should I keep?

Attendees will leave with a new perspective on timing, adaptation, and perception in social engineering, gaining insights into:

  1. How to identify moments of opportunity in real-time attacks.
  2. Why adaptability is more valuable than a perfect script.
  3. How artistic disciplines like photography, storytelling, and theater enhance deception techniques.
  4. How to shift security awareness from blame to responsibility, creating a more resilient human defense layer.

SE from another perspective

This talk isn’t just about one successful infiltration—it’s about changing how we approach social engineering altogether. The best hackers and social engineers don’t just exploit systems; they see what others don’t, react to what others ignore, and move when the moment is right.

Because, in the end, the best way in is often already in front of you—waiting to be seen.

“What better place than here? What better time than now?” — Rage Against the Machine

Access Everywhere.


Join Adversary Village Discord Server.

Join Adversary Village official Discord server to connect with our amazing community of adversary simulation experts and offensive security researchers!