← All talks

Red Team Entry Tactics: Covert vs. Overt Strategies Revealed #shorts

BSides Frankfurt0:59982 viewsPublished 2026-01Watch on YouTube ↗
About this talk
Red teams use covert entry (silent access) or overt entry (social engineering) to infiltrate. Once inside, objectives include hardware additions, document theft, or badge cloning for repeat access. #Bsidesfrankfurt #Bsides #Bsidesfra #RedTeam #Cybersecurity
Show transcript [en]

So phase two, you have covert entry and overt entry. Um for covert entry, for example, you have um the access card cloning, which we're also going to touch on today. Um covert means that you still under the radar. You're not talking to people. Um you try to get into the the premises without uh seeing anyone basically or talking to anyone. Uh the over entry for example, social engineering. Um yeah, that's where you make yourself known and you try to um trick people into basically letting you into the premises. And then phase three, once you're in there, you want to reach your objectives and sometimes you want to maintain access because it has happened before that we had to go in there multiple

times. Um, and that you do via hardware additions or you steal some documents or you try to steal uh badges they can use for the um batch cloning. Um, so who is who in the red