Senior Threat Intel Advisor, Team Cymru
Bachelor in Arts of Representation. With certifications in Social Engineering, Red Team & OSINT. Team
Leader of Fr1endly RATs, the Social Engineering unit at Dreamlab Technologies Chile.
Specializing and developing techniques and methodologies for simulations of Phishing attacks, Vishing,
Pretexting, Physical Intrusions and Red Team.
Sunday | Aug 10th
2025
DEF
CON Creator Stage 1 (Room 233) | Las Vegas Convention Center
Adversary
Simulation
Adversarial
Mindset
Gaining access isn’t always about having the perfect pretext. Sometimes, it’s about recognizing subtle shifts in the environment, reading behavioral cues, and adapting on the fly. The best social engineers, like master photographers, don’t just plan—they wait for the decisive moment and take action when the time is right.
This session unpacks a real-world infiltration where success wasn’t about meticulous scripting, but about understanding when and how to pivot in real time. By integrating principles from photography, literature, theater, and deception, we explore how presence, timing, and perception shape the art of infiltration.
Social engineering is often perceived as a game of deception, a battle of wits where the best pretext wins. But what if success has less to do with pretext and more to do with recognizing the moment? The difference between failure and access isn’t always in the plan—it’s in how well you read the environment, adapt to changes, and make the right move at the right time.
This talk will take the audience through a real-world social engineering operation, where meticulous planning was only half the equation. The real breakthrough came not from the pretext we prepared, but from an unexpected shift in the environment—one that we recognized and exploited in real time.
Through this story-driven session, we’ll explore:
The Story: A Real-World Infiltration
The foundation of this talk is a detailed case study of a successful infiltration. Initially, our team had a solid pretext, rehearsed interactions, fake email and well-crafted credentials. However, a subtle but critical change in the target’s environment shifted the conditions in our favor—something we wouldn’t have noticed had we been too focused on following the original plan.
We’ll walk through the key moments of the infiltration, including:
This isn’t just a story about breaking into a building—it’s a lesson in understanding social dynamics, adapting with precision, and turning the ordinary into the extraordinary.
The Framework: Social Engineering as an Art Form
To understand how and why these techniques work, the talk will connect social engineering tactics to broader artistic disciplines:
By integrating these concepts, we demonstrate how pretexts become more believable, interactions feel more organic, and access is granted rather than forced.
What should I keep?
Attendees will leave with a new perspective on timing, adaptation, and perception in social engineering, gaining insights into:
SE from another perspective
This talk isn’t just about one successful infiltration—it’s about changing how we approach social engineering altogether. The best hackers and social engineers don’t just exploit systems; they see what others don’t, react to what others ignore, and move when the moment is right.
Because, in the end, the best way in is often already in front of you—waiting to be seen.
“What better place than here? What better time than now?” — Rage Against the Machine
Access Everywhere.
Join Adversary Village official Discord server to connect with our amazing community of adversary simulation experts and offensive security researchers!