SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Physical
Penetration Testing
A Pen-Tester’s Toolkit
‣ Tina Ellis ‣ March 9th, 2022
What is Physical
Penetration Testing?
Physical penetration testing is used to
identify weaknesses in physical security
systems that attackers could exploit to gain
access to the facilities.
Physical penetration testers (pentesters) are
hired by organizations to test standing
security policies for the purpose of exposing
unknown vulnerabilities.
90% of network security is removed once a threat actor has physical access
- Wil Allsopp, Unauthorized Access: Physical Penetration Testing For IT Security Teams
Photo Courtesy of DarknetDiaries.com
Five Phases of Physical Penetration Testing
Reconnaissance
OSINT Intelligence
Gathering:
‣ Social Media
‣ Public Records
‣ Attack Surface Data
Communicate with
Client
Scanning and Probing
Travel to Location
Identify Potential
Targets
Physical Observations
Create Exploitation
Plan
Acquire Resources
Communicate with
Client
Exploitation
Social Engineering
Bypass Physical
Barriers
Bypass Doors
Communicate with
Client
Post-Exploitation
Identify Ways to Steal
Information:
Gain Access to
Sensitive Areas
Network Jacks in
Public Areas
Dumpster Diving
Communicate with
Client
Reporting
Intelligence Gathered
Remediation
Suggestions:
Training Opportunities
Camera Blind Spots
Door/Gate
Improvements
Alarm Evaluations
An Attacker Mindset
Pentesters know precisely how criminals might
gain access to both computer systems and
buildings and employ a variety of tools and
methods to gain access to a facility.
- RedTeamSecure.com
Photo Courtesy of DarknetDiaries.com
OSINT
CATEGORY
APPLICATION
INTELLIGENCE
TOOL
Social Media Intelligence
[SOCMINT]
Digital Network Intelligence
[DNINT]
Vehicle and Transportation
Intelligence
[VATINT]
Mapping and
Geo-Spatial Intelligence
[GEOINT]
Hunting ground for company
and employee information.
Identify technologies used and
vulnerabilities that can be
exploited.
Track down company vehicle
information. Vehicles can be
acquired to blend in.
Identify possible attack
vectors (access points).
‣ Uniforms & Badges
‣ Name & Photo
Identification
‣ Coffee & Lunch Hangouts
‣ Network and Systems
‣ Language & Technologies
‣ Possible Attack Vectors
‣ Host, DNS, & Mail Server
Info
‣ IoT Device and Open Ports
‣ Public AWS or Azure Buckets
‣ Area Public Wi-Fi AP’s
‣ Vendor Vulnerabilities
‣ Vehicle Recognition
‣ VIN Identification
‣ License Plate Lookup
‣ Internet Infrastructure
‣ Satellite Images
‣ Drone Images
‣ Street View Images
‣ Historical Facility Images
‣ CCTV Live Video Feeds
Google, OpenPayrolls,
GoFindWho, OnePlus OSINT
Toolkit, SkyLens, Social-
Search, Melissa Lookups,
Company & Employee Social
Media Pages, and Job
Postings
Open Directories CSE,
WhoisFreaks, CentralOps,
ZoomEye, IntoDNS,
Wappalyzer, HackerTarget,
Pulsedive, WiGLE, WiFi Map,
Shodan, Zoom Eye, Natlas,
Public Buckets, CVE Details
CarNetAI, VehicleHistory,
FaxVIN
GoogleMaps, Soar Earth,
Wayback World Imagery,
GeoHack Tools, FreeMapTools,
HawkEye360, Satelite.pro,
Infrapedia Map,
TravelWithDrone, CCTV
Reconnaissance Phase
Pentesters use a variety of Open-Source Intelligence (OSINT) tools to gather information about their target.
*These are just examples of the OSINT tools available. Actual tools vary.
Scanning and Probing Phase
Pentesters travel to the location and begin formalizing the
exploitation plan.
Physical observations are conducted in person. Night
reconnaissance might include locating camera location by using
night-vision goggles to see the infrared light emitted by night
surveillance cameras. Door, Gate, and Lock Brand information is
gathered. SOC location is identified, and any interesting info noted.
Resources are acquired: Pentesters scan and clone badges, put
together disguises, rent vehicles, and put together their toolkit.
Exploitation plan is created: After all the intelligence is gathered
an exploitation plan is created and shared with the client.
A “get-out-of-jail-free” card is acquired that proves their identity if they get caught
Pentesters communicate heavily with the parties. They also notify local authorities of their plan, so that they are not caught off guard. These steps are an important part
of maintaining the safety of all parties involved.
Photo Courtesy of DarknetDiaries.com
Exploitation Phase
This is the phase where pentesters deploy their physical penetration testing plan. To implement this plan, pentesters use a
variety of tools and methods, some technical and some not.
Social engineering is one non-technical approach that pentesters may employ to circumvent security controls. Pentesters
may use impersonation, disguises, badges, and a sense of urgency to blend in or gain access to sensitive systems and
information.
Physical access may also be obtained by observing the physical layout of the premises and identifying weak areas of
security that do not require any special tools. Unlocked doors and unmonitored entryways provide an opportunity for
access.
Bypassing security controls may also be an option by employing bypass tools such as plug spinners, hinge pin tools, door
and gate tools, generic keys, and SEARAT tools. Photo Courtesy of DarknetDiaries.com
The Physical Penetration Tools
Long range RFID readers and a
Proxmark III for cloning cards
Disguises: Safety vests, uniforms,
company cars, hard hats, lanyards
Multimeter, for equipment testing
and failure issues.
Camera, flashlight, GoPro, Binoculars
Ladders of various heights LANstar, LAN Cables, Small Wireless
Router, for Network System Access
Raspberry Pi’s – Plug into Network
Connection for Network Access
Shortwave radios for communication
The Physical Penetration Tools
Borescope to see under doors or
around corners
Night Vision Goggles: See at night and
locate night vision cameras
Fence keys: Linear & Door King have
generic keys available on Amazon
Wool blanket to protect your body
from barbed-wire fences
Door Tools: Double Door Tools, Under the
Door Tools, Shove-It Tool, Lockpicks
Plug Spinner: Prevents pins from
reengaging after lockpick, and re-locks
Hinge Pin Tool: Spring-loaded tool
used to pop hinges off doors
SEARAT: all-in-one entry tool includes key
blade, Window-Breaker, Gas Shut-off
Post-Exploitation
Phase
During the Post-Exploitation phase, the
pentesters identify the opportunities where
information could be stolen. They do not
actually steal anything but take pictures or
leave evidence (like a business card), to prove
that they could have stolen information.
‣ Gain Access to Sensitive Areas
‣ Network Jacks in Public Areas
‣ Dumpster Diving
Photo Courtesy of DarknetDiaries.com
Reporting Phase
After the exploitation plan has been executed, pentesters compile their findings
and create a report. The report includes any intelligence that was gathered during
the reconnaissance and probing phases; a list of detailed steps and methods that
were taken during the exploitation phase, as well as remediation suggestions that
will improve an organization's overall security program.
Physical pentesters “undertake wildly ambitious and incredibly
complex activities intended to reveal opportunities for a
potential real-life showdown between good and evil - a heavily
defended company against a would-be attacker"
- RedTeamSecure.com
References
Darknet Diaries. (2021, June 22). Retrieved from
https://darknetdiaries.com/
Deane, A. J., & Kraus, A. (2021). The official (ISC)2 CCSP Cbk
Reference. Sybex.
Halton, W., & Weaver, B. (2017). Penetration Testing: A Survival
Guide. Packt Publishing.
Mike Sheward. (2020). Security Operations in Practice. BCS,
The Chartered Institute for IT.
Rhysider, J. (Host). (2021, June 22). Jon and Brian's Big
Adventure [Audio podcast]. Retrieved from
https://darknetdiaries.com/transcript/95/
RedTeam Security, R. (n.d.). Physical penetration testing
services: RedTeam Security. RedTeam Security - 5200 Willson
Rd. Suite 150, Edina, MN 55424. Retrieved March 4, 2022, from
https://www.redteamsecure.com/penetration-
testing/physical-penetration-testing
Sillanpää, M., & Hautamäki, J. (2020, July). Social Engineering
Intrusion: A Case Study. In Proceedings of the 11th International
Conference on Advances in Information Technology (pp. 1-5).
Young, J. A. (2020). The Development of a Red Teaming
Service-Learning Course. Journal of Information Systems
Education, 31(3), 157–178.
Photo Courtesy of DarknetDiaries.com

More Related Content

PDF
Physical Penetration Testing (RootedCON 2015)
PDF
Security Maturity Models.
PPTX
Cyber threat intelligence: maturity and metrics
PPT
Physical Security Assessments
PDF
Principios basicos de_cctv__3
PDF
A Threat Hunter Himself
PDF
Click and Dragger: Denial and Deception on Android mobile
PPTX
Physical Security Assessment
Physical Penetration Testing (RootedCON 2015)
Security Maturity Models.
Cyber threat intelligence: maturity and metrics
Physical Security Assessments
Principios basicos de_cctv__3
A Threat Hunter Himself
Click and Dragger: Denial and Deception on Android mobile
Physical Security Assessment

What's hot (20)

PPTX
PDF
Why ISO27001 For My Organisation
PDF
Battling Unknown Malware with Machine Learning
PDF
NIST cybersecurity framework
PDF
Weaponizing Your DevOps Pipeline
PPT
8. operations security
PDF
Drone forensics
PPTX
Incident response
PPTX
PPTX
ITGC audit of ERPs
PPTX
Close protection
PDF
Pentest as a Service Impact 2020
PDF
You can detect PowerShell attacks
PPT
Anti-Forensics: Real world identification, analysis and prevention
PDF
Google Cloud Forensics & Incident Response
PDF
EBIOS Risk Manager
PPT
Physical Security Assessment
PPT
SWAT TACTICS
PPTX
Cyber Purple Teaming: Uniting Blue and Red Teams - B Sides San Antonio - Albe...
PPTX
Responsible care audit code0.pptx
Why ISO27001 For My Organisation
Battling Unknown Malware with Machine Learning
NIST cybersecurity framework
Weaponizing Your DevOps Pipeline
8. operations security
Drone forensics
Incident response
ITGC audit of ERPs
Close protection
Pentest as a Service Impact 2020
You can detect PowerShell attacks
Anti-Forensics: Real world identification, analysis and prevention
Google Cloud Forensics & Incident Response
EBIOS Risk Manager
Physical Security Assessment
SWAT TACTICS
Cyber Purple Teaming: Uniting Blue and Red Teams - B Sides San Antonio - Albe...
Responsible care audit code0.pptx
Ad

Similar to Physical-Penetration-Presentation-Tina-Ellis.pptx (20)

PDF
IRJET- A Survey on Object Detection using Deep Learning Techniques
PDF
Physical Penetration Testing - RootedCON 2015
PDF
Corporate threat vector and landscape
PPTX
pres_drone_forensics_program.pptx
DOCX
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
PDF
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
PDF
Road map for actionable threat intelligence
PDF
Securing Your Wearable Tech Brand
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
PDF
Exploring the Potential of Shodan From Networking to Cybercrime.pdf
PDF
IRJET-Ethical Hacking
PDF
Introduction to Forensic Research Digital Forensics
PPTX
Operationalizing Security Intelligence
PDF
Vulnerability Assessment and Penetration Testing using Webkill
PDF
A6704d01
PPTX
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
PDF
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
PDF
Cyber Threat Hunting Workshop.pdf
PDF
Cyber Threat Hunting Workshop.pdf
IRJET- A Survey on Object Detection using Deep Learning Techniques
Physical Penetration Testing - RootedCON 2015
Corporate threat vector and landscape
pres_drone_forensics_program.pptx
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
Road map for actionable threat intelligence
Securing Your Wearable Tech Brand
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
Exploring the Potential of Shodan From Networking to Cybercrime.pdf
IRJET-Ethical Hacking
Introduction to Forensic Research Digital Forensics
Operationalizing Security Intelligence
Vulnerability Assessment and Penetration Testing using Webkill
A6704d01
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
Ad

Recently uploaded (20)

PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Sensors and Actuators in IoT Systems using pdf
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PPTX
Cloud computing and distributed systems.
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PDF
Transforming Manufacturing operations through Intelligent Integrations
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Review of recent advances in non-invasive hemoglobin estimation
Sensors and Actuators in IoT Systems using pdf
madgavkar20181017ppt McKinsey Presentation.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
The Rise and Fall of 3GPP – Time for a Sabbatical?
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
Cloud computing and distributed systems.
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Spectral efficient network and resource selection model in 5G networks
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
Transforming Manufacturing operations through Intelligent Integrations

Physical-Penetration-Presentation-Tina-Ellis.pptx

  • 1. Physical Penetration Testing A Pen-Tester’s Toolkit ‣ Tina Ellis ‣ March 9th, 2022
  • 2. What is Physical Penetration Testing? Physical penetration testing is used to identify weaknesses in physical security systems that attackers could exploit to gain access to the facilities. Physical penetration testers (pentesters) are hired by organizations to test standing security policies for the purpose of exposing unknown vulnerabilities. 90% of network security is removed once a threat actor has physical access - Wil Allsopp, Unauthorized Access: Physical Penetration Testing For IT Security Teams Photo Courtesy of DarknetDiaries.com
  • 3. Five Phases of Physical Penetration Testing Reconnaissance OSINT Intelligence Gathering: ‣ Social Media ‣ Public Records ‣ Attack Surface Data Communicate with Client Scanning and Probing Travel to Location Identify Potential Targets Physical Observations Create Exploitation Plan Acquire Resources Communicate with Client Exploitation Social Engineering Bypass Physical Barriers Bypass Doors Communicate with Client Post-Exploitation Identify Ways to Steal Information: Gain Access to Sensitive Areas Network Jacks in Public Areas Dumpster Diving Communicate with Client Reporting Intelligence Gathered Remediation Suggestions: Training Opportunities Camera Blind Spots Door/Gate Improvements Alarm Evaluations
  • 4. An Attacker Mindset Pentesters know precisely how criminals might gain access to both computer systems and buildings and employ a variety of tools and methods to gain access to a facility. - RedTeamSecure.com Photo Courtesy of DarknetDiaries.com
  • 5. OSINT CATEGORY APPLICATION INTELLIGENCE TOOL Social Media Intelligence [SOCMINT] Digital Network Intelligence [DNINT] Vehicle and Transportation Intelligence [VATINT] Mapping and Geo-Spatial Intelligence [GEOINT] Hunting ground for company and employee information. Identify technologies used and vulnerabilities that can be exploited. Track down company vehicle information. Vehicles can be acquired to blend in. Identify possible attack vectors (access points). ‣ Uniforms & Badges ‣ Name & Photo Identification ‣ Coffee & Lunch Hangouts ‣ Network and Systems ‣ Language & Technologies ‣ Possible Attack Vectors ‣ Host, DNS, & Mail Server Info ‣ IoT Device and Open Ports ‣ Public AWS or Azure Buckets ‣ Area Public Wi-Fi AP’s ‣ Vendor Vulnerabilities ‣ Vehicle Recognition ‣ VIN Identification ‣ License Plate Lookup ‣ Internet Infrastructure ‣ Satellite Images ‣ Drone Images ‣ Street View Images ‣ Historical Facility Images ‣ CCTV Live Video Feeds Google, OpenPayrolls, GoFindWho, OnePlus OSINT Toolkit, SkyLens, Social- Search, Melissa Lookups, Company & Employee Social Media Pages, and Job Postings Open Directories CSE, WhoisFreaks, CentralOps, ZoomEye, IntoDNS, Wappalyzer, HackerTarget, Pulsedive, WiGLE, WiFi Map, Shodan, Zoom Eye, Natlas, Public Buckets, CVE Details CarNetAI, VehicleHistory, FaxVIN GoogleMaps, Soar Earth, Wayback World Imagery, GeoHack Tools, FreeMapTools, HawkEye360, Satelite.pro, Infrapedia Map, TravelWithDrone, CCTV Reconnaissance Phase Pentesters use a variety of Open-Source Intelligence (OSINT) tools to gather information about their target. *These are just examples of the OSINT tools available. Actual tools vary.
  • 6. Scanning and Probing Phase Pentesters travel to the location and begin formalizing the exploitation plan. Physical observations are conducted in person. Night reconnaissance might include locating camera location by using night-vision goggles to see the infrared light emitted by night surveillance cameras. Door, Gate, and Lock Brand information is gathered. SOC location is identified, and any interesting info noted. Resources are acquired: Pentesters scan and clone badges, put together disguises, rent vehicles, and put together their toolkit. Exploitation plan is created: After all the intelligence is gathered an exploitation plan is created and shared with the client. A “get-out-of-jail-free” card is acquired that proves their identity if they get caught Pentesters communicate heavily with the parties. They also notify local authorities of their plan, so that they are not caught off guard. These steps are an important part of maintaining the safety of all parties involved. Photo Courtesy of DarknetDiaries.com
  • 7. Exploitation Phase This is the phase where pentesters deploy their physical penetration testing plan. To implement this plan, pentesters use a variety of tools and methods, some technical and some not. Social engineering is one non-technical approach that pentesters may employ to circumvent security controls. Pentesters may use impersonation, disguises, badges, and a sense of urgency to blend in or gain access to sensitive systems and information. Physical access may also be obtained by observing the physical layout of the premises and identifying weak areas of security that do not require any special tools. Unlocked doors and unmonitored entryways provide an opportunity for access. Bypassing security controls may also be an option by employing bypass tools such as plug spinners, hinge pin tools, door and gate tools, generic keys, and SEARAT tools. Photo Courtesy of DarknetDiaries.com
  • 8. The Physical Penetration Tools Long range RFID readers and a Proxmark III for cloning cards Disguises: Safety vests, uniforms, company cars, hard hats, lanyards Multimeter, for equipment testing and failure issues. Camera, flashlight, GoPro, Binoculars Ladders of various heights LANstar, LAN Cables, Small Wireless Router, for Network System Access Raspberry Pi’s – Plug into Network Connection for Network Access Shortwave radios for communication
  • 9. The Physical Penetration Tools Borescope to see under doors or around corners Night Vision Goggles: See at night and locate night vision cameras Fence keys: Linear & Door King have generic keys available on Amazon Wool blanket to protect your body from barbed-wire fences Door Tools: Double Door Tools, Under the Door Tools, Shove-It Tool, Lockpicks Plug Spinner: Prevents pins from reengaging after lockpick, and re-locks Hinge Pin Tool: Spring-loaded tool used to pop hinges off doors SEARAT: all-in-one entry tool includes key blade, Window-Breaker, Gas Shut-off
  • 10. Post-Exploitation Phase During the Post-Exploitation phase, the pentesters identify the opportunities where information could be stolen. They do not actually steal anything but take pictures or leave evidence (like a business card), to prove that they could have stolen information. ‣ Gain Access to Sensitive Areas ‣ Network Jacks in Public Areas ‣ Dumpster Diving Photo Courtesy of DarknetDiaries.com
  • 11. Reporting Phase After the exploitation plan has been executed, pentesters compile their findings and create a report. The report includes any intelligence that was gathered during the reconnaissance and probing phases; a list of detailed steps and methods that were taken during the exploitation phase, as well as remediation suggestions that will improve an organization's overall security program. Physical pentesters “undertake wildly ambitious and incredibly complex activities intended to reveal opportunities for a potential real-life showdown between good and evil - a heavily defended company against a would-be attacker" - RedTeamSecure.com
  • 12. References Darknet Diaries. (2021, June 22). Retrieved from https://darknetdiaries.com/ Deane, A. J., & Kraus, A. (2021). The official (ISC)2 CCSP Cbk Reference. Sybex. Halton, W., & Weaver, B. (2017). Penetration Testing: A Survival Guide. Packt Publishing. Mike Sheward. (2020). Security Operations in Practice. BCS, The Chartered Institute for IT. Rhysider, J. (Host). (2021, June 22). Jon and Brian's Big Adventure [Audio podcast]. Retrieved from https://darknetdiaries.com/transcript/95/ RedTeam Security, R. (n.d.). Physical penetration testing services: RedTeam Security. RedTeam Security - 5200 Willson Rd. Suite 150, Edina, MN 55424. Retrieved March 4, 2022, from https://www.redteamsecure.com/penetration- testing/physical-penetration-testing Sillanpää, M., & Hautamäki, J. (2020, July). Social Engineering Intrusion: A Case Study. In Proceedings of the 11th International Conference on Advances in Information Technology (pp. 1-5). Young, J. A. (2020). The Development of a Red Teaming Service-Learning Course. Journal of Information Systems Education, 31(3), 157–178. Photo Courtesy of DarknetDiaries.com