LLM-Assisted Phishing in Practice.
Talk resources, defensive training offerings, and a BSides SATX–only engagement offer for the first five inquiries. If you saw the talk, this is where to start.
What was covered.
A real adversary simulation engagement against a national enterprise. Cloned an executive's voice from a single podcast appearance, ran a phishing call against the organization's help desk, walked away with high-privilege network admin credentials about five minutes in. The talk walks the full setup — what worked, what didn't, what I'd do differently.
First public presentation of the original work. Built the methodology at TrustedSec where it grew from an internal experiment into a billable service. A colleague later included aspects of this engagement in a talk at Wild West Hackin' Fest. This talk covers engagement detail not in the prior presentation.
Practitioner-focused. No vendor pitch. Reproducible with any frontier LLM and a commercial voice-cloning service.
Train against this attack class.
The deck.
Available after the live talk. Email me and I'll send it directly, or check back once it's posted here.
Request the deck →The methodology is a service.
Free AI Exposure Recon — first five.
First five inquiries through this page get a free AI-T0 Exposure Recon engagement. No catch, no contract bait. If the report comes back clean, it says so.
Talk through your environment.
Help desk, AI product, or cloud posture. 15 minutes is enough to figure out whether there's an engagement worth scoping.
Get in touch