Bishop Fox at HackGDL 2026
- Date:
- March 12-14, 2026
- Location:
- Guadalajara, México
- Speakers:
- José Emiliano Perez, Security Consultant & Juan Jasso, Security Consultant II & Patricio Sanchez, Regional Director I & Marco Sanchez, Security Consultant II & Abdel Bolivar, Managing Senior Consultant I & Roberto Chavez, Security Consultant II & Areli Ch Duran, Senior Technical Recruiter & Steeven Rodriguez, Senior Adversarial Operator & Luis De la Rosa Hernandez, Security Consultant II
We’re excited to be back at HackGDL once again! This event has become a great place to connect with builders, breakers, and curious minds who care about how security actually works in the real world. HackGDL’s focus on hands-on learning, community, and open knowledge lines up closely with how we approach offensive security. We’re proud to return as a sponsor and to share what our team has been learning through a series of practical, workshop sessions.
Why stop by?
- Learn directly from practitioners who break real systems for a living
- Get hands-on exposure to modern attack techniques and common failure patterns
- Ask questions and swap stories with our team between sessions
- Connect with the local and regional security community
- Pick up ideas you can apply immediately in your own work
For more details, visit: HackGDL.net
"Unpacking the Bundle - Weaponizing Webpack & Source Maps for Critical Info Disclosure"
Speaker: Emiliano Perez, Security Consultant, Bishop Fox
Abstract: Modern Single Page Applications (SPAs) rely heavily on bundlers like Webpack, Vite, and Parcel to package dependencies and business logic. However, the transition from development to production can leave sensitive information, leading to an information disclosure. In this workshop, I will dissect the internal structure of JavaScript bundles and the associated Source Map standard. We will look specifically at how the devtool configuration in webpack.config.js impacts the final artifact and why developers frequently leave full source recovery enabled by mistake.
"Cloud Hacking 101: How to Survive in the Clouds"
Speaker: Juan Jasso, Security Consultant II, Bishop Fox
Abstract: In this workshop we will learn the basics of Security Assessments on cloud environments. To show/illustrate this ideas we will use a custom made AWS environment from the Bishop Fox's learning platform "Cloudfoxable" and Bishop Fox's cloud security tool Cloudfox, to show how to look for/discover exploitation techniques. Participants will get hands-on activities to perform with live challenges to sense real life problems and solutions. The challenges will include enumeration and exploitation activities discovering misconfigurations on the environment.
"Reverse Engineering Your Career: A Hacker’s Approach"
Speaker: Patricio Sanchez, Regional Director I, Bishop Fox
Abstract: After more than 20 years building and leading advanced offensive and defensive security teams across Latin America and the United States, I’ve observed a consistent pattern: highly skilled technical professionals often struggle to advance, not because of a lack of capability, but because of how they approach their careers.
In cybersecurity, career paths are rarely linear. Roles evolve quickly, expectations shift, and the skills that make someone a strong practitioner are not always the same skills that drive long-term growth.
This talk reframes career progression through a technical lens. We will examine why technical depth alone is insufficient, what high-performing red and blue teams actually value beyond tooling and exploits, and how to strategically build expertise in areas such as advanced tradecraft, specialization, and cross-functional impact.
Rather than motivational advice, this session offers a practical framework to help security professionals think like attackers—not just against systems, but against the limitations of their own career models.
"From Debug to Root: A Friendly Introduction to Hardware Hacking"
Speaker: Marco Sanchez, Security Consultant II, Bishop Fox & Abdel Bolivar, Managing Senior Consultant I, Bishop Fox
Abstract: Nowadays, embedded and IoT devices play an important role in corporate and industrial environments, and even in our homes. Some of them are responsible for critical tasks. But how secure are they? In this workshop, attendees will explore the world of hardware hacking by evaluating a real device. They will learn how to identify the main components of a device, interact with debugging interfaces, and extract and analyze the device's firmware to identify vulnerabilities and misconfigurations.
"Tales from the Bugfront: The Chain That Broke the Castle"
Speaker: Roberto Chavez, Security Consultant II, Bishop Fox
Abstract: This talk explores how security impact is achieved through the combination of multiple small weaknesses rather than a single vulnerability. It focuses on how repeated developer oversights and common security misconfigurations can gradually expand the attack surface. Throughout the session, concepts such as reconnaissance, application analysis, API testing, and mobile security are introduced to demonstrate how these weaknesses can be discovered, analyzed, and chained together, ultimately leading to serious vulnerabilities across modern applications.
"Craft your Cyber Identity & Ace Your Interviews"
Speaker: Areli Ch. Duran, Senior Technical Recruiter, Bishop Fox
Abstract: In this session, you’ll learn how to create a personal cybersecurity brand that feels authentic, confident, and uniquely you. We’ll break it down into five simple steps that help you define your professional value, communicate it clearly, and stand out in a competitive industry.
You’ll also get practical interviewing tips that recruiters actually care about, plus the chance to practice live so you walk away ready to shine in your next interview. Perfect for students, aspiring professionals, and anyone looking to level up their cyber career.
"iOS Game Hacking: From Zero to God Mode"
Speaker: Steeven Rodriguez, Senior Operator I, Bishop Fox & Luis De la Rosa, Security Consultant III, Bishop Fox
Abstract: A practical introduction to game hacking on iOS, demonstrating from scratch how games developed for this platform can be analyzed and modified in real time. Through live demos, reverse engineering and hooking techniques are shown to enable features such as God Mode, Infinite Coins, and Speed Hacks, dispelling the myth that iOS is an unhackable ecosystem.