Skip to content
Hardwear.io USA

Reverse Engineering Card Skimmers


Course
Upgrade subscription below

Aidan Quimby of IBM explains how real adversary tradecraft exposes defensive gaps and what offensive operations reveal about stopping modern cyberattacks.

Modern cyber adversaries move with speed, precision and deep operational discipline, blending technical exploitation with social engineering and infrastructure abuse. Understanding how real attackers plan, adapt and evade detection is critical for improving defensive readiness and reducing organizational risk. Offensive security operations expose how weaknesses in identity, endpoint visibility and response processes create opportunities for compromise. By examining attacker behaviors across the full intrusion life cycle, organizations can better prioritize controls that disrupt threats before material damage occurs.

In this session, led by Aidan Quimby, X-Force red hacker at IBM, you will learn:

  • How real-world attackers chain misconfigurations, credentials and tooling to gain access;
  • The role of identity and endpoint gaps in enabling persistent access;
  • Where traditional controls fail against hands-on-keyboard activity.
 

Here is the course outline:

Reverse Engineering Card Skimmers to Retrieve Stolen Payment Information

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button