Tactics of Physical Pen Testers
![](https://i.ytimg.com/vi/SzzEn0s8JA4/mqdefault.jpg)
25:31
What You Do and Don't Need in a Physical Security Consulting Toolkit
![](https://i.ytimg.com/vi/JsVtHqICeKE/mqdefault.jpg)
40:47
DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (w speaker)
![](https://i.ytimg.com/vi/pL9q2lOZ1Fw/mqdefault.jpg)
15:51
Watch hackers break into the US power grid
![](https://i.ytimg.com/vi/AayXf5aRFTI/mqdefault.jpg)
48:30
Copying Keys from Photos, Molds & More
![](https://i.ytimg.com/vi/xl2Xx5YOKcI/mqdefault.jpg)
30:14
TryHackMe! Basic Penetration Testing
![](https://i.ytimg.com/vi/Ccm1caB6bao/mqdefault.jpg)
16:45
How to Bypass RFID Badge Readers (w/ Deviant Ollam and Babak Javadi)
![](https://i.ytimg.com/vi/mj2iSdBw4-0/mqdefault.jpg)
43:44
You’re Probably Not Red Teaming... And Usually I’m Not, Either [SANS ICS 2018]
![](https://i.ytimg.com/vi/oHf1vD5_b5I/mqdefault.jpg)
1:00:17