Hacking Tool : Physical controls

The first thing that we will need to explore is the physical controls. This means
that you will need to learn how the security team works, including how they
manage access, monitor, and control the company. You may notice that with the
company, there may be some sections that are restricted, private, and public and
this will help you to determine the technique that is the best for you.

To start, you will need to look at the perimeter security. You will need to check
the outside of the business, including the mantraps, turnstiles, cameras,
surveillance, dogs, fences, walls, and anything else that would keep you out of the
company. These will be any deterrent that will keep you outside of the company.
Some companies may not even have more than a security officer who checks the
front desk, or they may not even have that much.

It is your job to go through the perimeter check and figure out where everything is
and where the weaknesses are all located because these are going to be the places
that you can exploit. You will be able to get some ideas just by looking around the
building.

You should also consider ID badges. Some companies will have some of these ID
badges because it helps them to control and monitor the movement of their
employees. They can also check out the directories and files that an employee will
modify or create based on the type of badges that the company uses. If possible,
you should consider getting ahold of these badges so that you can get in. In some
cases, it is hard to one of these badges, but there are some other options that you
can use including:

Enter as a visitor with one of the guards, but then find a way to get awayfrom your escort.
Use a technique that is known as tailgating. You will need to assume that
the building doesn’t have a mantrap with it.
Find an employee who is out on a break, like in the smoking area, and
then follow them in while continuing the conversation so it looks like you
belong.
Find a fake uniform and pretend to be a repairman, sales person, or a
contractor. This will help you to get into the building.

There can also be some intrusion detection systems. These would include some
options like intrusion alarms and motions. It is important to have a good idea of
the types of alarms and monitoring systems that are used inside the building so you
can avoid these.

Popular posts from this blog

Activating all versions of Windows Server without a product key

How to Activate Microsoft Office 2010 without Product Key for Free

How to Troubleshoot “connection to KMS server failed” error | KMS Server failed [Solved]