Physical Penetration, RFID Hacking, & Electronic Access Control Systems

Training Overview

Physical Penetration, RFID Hacking & Electronic Access Control Systems is an advanced, hands-on red and blue team training at CSA XCON 2026, designed to expose the real-world weaknesses in physical security systems protecting modern enterprises, government facilities, and critical infrastructure.

While organizations invest heavily in network defenses, physical access remains one of the most exploited attack vectors. This training immerses participants in the realities of mechanical locks, RFID credentials, alarms, door controllers, and Physical Access Control Systems (PACS) that protect digital, material, and human assets worldwide.

Participants will learn how physical security actually works in the field and how attackers manipulate, bypass, clone, downgrade, intercept, and replay their way through it.

About the Training at CSA XCON 2026

This is a hardware-first, field-realistic training, not theory or slideware.

Key highlights include:

This training aligns perfectly with CSA XCON’s mission of delivering practical, real-world cybersecurity skills beyond the digital perimeter.

Hands-On Core Experience: RFID Door Simulator

Every participant works with a custom RFID Training Door Simulator, often described as a “Building in a Box.”

This unique hardware platform simulates:

Features include:

Participants will attack and analyze multiple credential technologies, gaining field-ready experience that cannot be replicated with software alone.
This hardware is custom-built and unavailable anywhere else.

What You Will Learn

Mechanical Locking Systems
RFID & Electronic Credentials
Physical Access Control Systems (PACS)
Red Team Physical Attacks
Blue Team Defense & Design

Training Experience & Expectations

Participants leave with complete situational awareness of physical security weaknesses and defenses.

Key Takeaways

Who Should Attend

This training is ideal for:

Skill Level

Beginner to Intermediate

Participant Requirements

Participants should bring:

Virtual machines and restricted Windows “S Mode” systems are not recommended.

What Participants Will Receive

Each participant will use and retain a field-capable physical penetration toolkit, including:

This is one of the most comprehensive physical pentesting kits offered in any conference training.