Red Teaming: Top tools and gadgets for physical assessments

Infosec Institute - 

Understanding the strengths and weaknesses of physical security controls in critical infrastructures is a valuable part of cybersecurity. Because from this angle, adversaries can obtain confidential information about targeted assets. Imagine that you access the main door, enter the lift and take a photo of the building’s floor plan. These techniques can provide you with a lot of information about critical locations to keep under the radar. 

While many organizations have a strong awareness of emerging cyberattacks, their concerns are not as well observed regarding physical security. The risk associated with physical attacks is high because there is often no adequate protection against daily situations. For instance, imagine a simulation that includes bypassing the door locks, stealing devices, or even using social engineering strategies to get valuable information. This scenario could include convincing the employee to connect a USB device to their computer, take photos from long-range to capture sensitive information from an opened window, or even using the same uniform of the cleaning services to access the servers’ room.

In this sense, there is a broad set of approaches and strategies to address this kind of attack. The benefits are apparent:

Exposing weak physical barriers, such as gaps

Read More: