Hack : Gaining Physical Access to a System
Once you are done with your penetration testing, there may be a few things in your
system that you will need to fix. We are going to move on to some of the attacks
that you can work on in your system to help keep it safe. This chapter will be
about gaining physical access to your system. The physical access can make it
easy for a hacker to get into the system, as long as they can touch the computers in
the system.
Sometimes, the hacker could be one of the employees who already has access to
the system. They will use some of their skills to look around and get the
information that they want. Other times, security may be lax around the company
and a stranger can get in. They may learn the uniforms or dress code of the
company and if that company is large, and doesn’t have a good security system,
the hacker could get right in the building and no one would realize it.
Since our world has changed so much in terms of technology, moving to
smartphones, tablets, USB drives and other handheld devices, it is pretty easy for
the hacker to get ahold of the devices that they want. Let’s take a look at some of
the ways that a hacker could gain physical access to your system.
Types of vulnerabilities
There are a few vulnerabilities that will make it easier for someone to gain the
physical access that they need. Some of these vulnerabilities include:
● Failure to have a front desk that will keep track of the people who comeinto and leave the building.
● Failure to enforce the employees to sign in as well as any visitors to the
building.
● Security staff and other employees that don’t know each other all that
well. This makes it easier for people to get into the building.
● Tossing sensitive documents, whether they are personal or corporate,
into the trash. You employees should be trained to shred these papers
instead.
● Leaving the doors that go into the computer rooms unlocked.
● Leaving devices with important information all around the office.
● Failure to fix up a door that isn’t shutting the way that it should.
system that you will need to fix. We are going to move on to some of the attacks
that you can work on in your system to help keep it safe. This chapter will be
about gaining physical access to your system. The physical access can make it
easy for a hacker to get into the system, as long as they can touch the computers in
the system.
Sometimes, the hacker could be one of the employees who already has access to
the system. They will use some of their skills to look around and get the
information that they want. Other times, security may be lax around the company
and a stranger can get in. They may learn the uniforms or dress code of the
company and if that company is large, and doesn’t have a good security system,
the hacker could get right in the building and no one would realize it.
Since our world has changed so much in terms of technology, moving to
smartphones, tablets, USB drives and other handheld devices, it is pretty easy for
the hacker to get ahold of the devices that they want. Let’s take a look at some of
the ways that a hacker could gain physical access to your system.
Types of vulnerabilities
There are a few vulnerabilities that will make it easier for someone to gain the
physical access that they need. Some of these vulnerabilities include:
● Failure to have a front desk that will keep track of the people who comeinto and leave the building.
● Failure to enforce the employees to sign in as well as any visitors to the
building.
● Security staff and other employees that don’t know each other all that
well. This makes it easier for people to get into the building.
● Tossing sensitive documents, whether they are personal or corporate,
into the trash. You employees should be trained to shred these papers
instead.
● Leaving the doors that go into the computer rooms unlocked.
● Leaving devices with important information all around the office.
● Failure to fix up a door that isn’t shutting the way that it should.