Getting your scope in control during a Quishing Red Teaming Assessment

Red teaming can be challenging especially when simulating real-world attacks like QR code phishing (“quishing”) within a tightly defined scope. How do you credibly launch a phishing campaign without wanting to know the specific targets, exposing sensitive information, or putting unintended users at risk? This session offers a behind-the-scenes look at how our team tackled these constraints. We will dig into some opensource tools that can be used and some custom tweaks that we made to make it more secure / believable and the pitfalls you can hopefully avoid. We will walk you through our attack chain: (1) Creating a phishing poster, (2) Using a customized EvilGinx instance to verify the scope, (3) Creating a believable landing page for our targets, and (4) Lessons learned and possible automated attacks.

    Speaker

    FURTHER SESSIONS

  • AI security lessons from the frontline

  • Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels

  • Breaking Entra: Real-World Cloud Identity Attacks You Can Recreate

  • Closing remarks

  • Join us in Amsterdam!

    November 20, 2025

    Hang out, learn something awesome and make new friends.