🌊 Physical Penetration Testing | Cybrary.IT




This one isn't a PenTesting Room. This is more my notes from the Physical PenTest Course to complete my 50 CEUs requirement to keep my CompTIA Security+ Qualification. 

I've written on paper the previous chapter. I'll type out Chapter 3.1 Information Gathering Methods on my blog as I think it's a bit more relevant to the theme of my documentations here. 

Recon Types
-Passive, this could go unnoticed 
-Active, attacker engages with the target 

Passive Recon Types
-Google Fu 
-Company Websites 
-Drive Bys
-OSINT (Open-Source Intel)
-IMINT (Imagery Intel Gathering)

OSINT
-Collecting data from publicly available sources 
-Things to look for:
--Company Information
--Competitive Intel
--People and Contacts 
--Open Jobs (Sometimes they list the technologies they use)
--Social Media and Networking 

IMINT 
-Imagery Intel
-Collecting information via satellite and aerial photography 
-Electronic Surveillance
--Cameras
--Microphones 
--Covert Surveillance (Hidden Cameras & Microphones) 

Active Recon Types
-Port Scanning
-Physically interacting with employees or target
-Phone calls
-HUMINT via Social Engineering (Human Intel) 
-Dumpster Diving 
-Shoulder Surfing 

Information Gathering Labs 
-Kali Linux (Good to use VPN so you're not tracked) 
-Google Technique (e.g. Company Name + About Us) 

4.1 Equipment 
-New devices are always manufactured
-Lock Picks 
-Bypass Tools, to get around security barriers using non-traditional methods 

4.4 Specialised Hacking Tools 
-Monitor Keystrokes 
-Capture Network Traffic 
-Capture Wireless Traffic 
-Perform Automated Attacks 
-Network Implants
--Physical tools insert into USB or wired ports
--Capture network traffic 
--Can capture in real time 
--e.g. LAN Turtle 
--WiFi Penetration Tools
---Small Concealable Devices
---Automate Attacks
---Capture Credentials
---Deauthenticate
---Broadcast Phony Networks 
--USB Attack Tools 
---Used by testers or given no targets
---Scripted attacks
---Spoof keyboards, ethernet devices, or use scripts
---Fast and Automated 
-Keyloggers
--Capture keystrokes
--Inserted in line with keyboard
--Pass ahrdware ID through
--Store thousands of lines of text 

Other types of Equipments of course includes laptops and smart phones for hacking and even cameras.

Sometimes cameras have Wi-Fi functions that you can use for recon. 

-Radio Scanners
-Wireless Camera Scanners 



Lock Picking 
-Picking Pin Locks (via raking)
-Tubular Locks (Circular)
-Wafer Locks (Low Security)
-Warded Locks (Skeleton Keys)
-Combination Locks 
--Single Dial Combination Locks
--Multiple Combination Locks
-Electronic Locks (Fail Secure Electric Strike)

7.1 Bypassing Tools and Strategies Introduction
Under the door tools 
-Mule Tool
--Similar design to modern version
--Rubber patch is attached to right angle end
--Metal wire is attached to rubber patch material 

-Door Shimming Tools
--Gap near latch
--Pushes latch back into door
--Shims can be plastic and metal
--Different shapes, sizes and thicknesses
--Door must only be locked with the latch 

-Crash Bar Tools
--Double doors with crash bars
--Fits between gap in the middle
--End of the tool pushes crash bar 

-Thumbturn Bypass Tool 
--Works on double doors
--Inserted into gap
--Handle turns the smaller
--u-shaped metal piece 

Lock Bypass Tools
-Lock Bumping
--Open pin lock through "bumping"
--Bump key
--Bump key hammer
--Hit key with bump key hammer
--Turn while being hit
--Pick gun 

-Pick Gun 
--Similar to bump keys, the goal is to open pin lock through "bumping"
--Needle picks
--Tension wrench 

-Padlock Shims
--Padlocks have common flaws in the shackle
--Padlock shim fit between shackle cutout and roller
--Not every padlock is susceptible 

-Decoding Combination Locks
--Almost all have flaws
--To decode some require tools, some do not
--Some can be decoded with a thin piece of metal (decoder) 

-Warded Keys
--Also known as skeleton keys
--Bypasses wards
--Strips of metals with different shapes
--Strategic bends

Wafer Keys
--Strategically shaped keys
--Fit into wafers
--Handful of configurations
--Can be faster than picking 

1.16 Sensor Bypass Methods
-Cut power
-Improperly placed sensors
-Enter before they are armed
-Block sensors
-Trip sensors 
-Motion Sensors that unlock doors
--Simple Motion
--Motion towards sensors
-Canned air
-Vaping
-Tape measure 

Creating Fake Badges
-Research badges' appearance
-Laminate
-PVC cards
-Barcodes

Cloning CHips in Badges
-Scannable to allow access
-Encrypted or not
-RFID
-Concealable cloners

Gates, Fences, and other Barriers
-First line of defense
-Over, under, or social engineer
-Tailgating

Mantraps
-Allows one person at a time
-Credentials needed
-Sensors
-Trigger fire alarm
-Bypass

8.3 Overt Testing 
-Testing in plain sight
-Work within security controls
-Typically uses social engineering

Covert Testing 
-Secretive or hidden
-Not trying to avoid people
-Blend in to the crowd
-Some social engineering may be required, but not always

Unseen Testing
-Completely out of view
-Trying to avoid people
-Strong physical skills
--Lock Picking
--Climbing
--Bypassing
-Usually done after hours

Exploring a Target Site
-Gather information
-Get an idea of the layout
-Get an idea of where assets and/or info is
-Don't raise suspicion
-Take opportunities to test 

Reception Desk
-Welcome and provide info
-Deal with lots of people
-Great source of info or access 
-Gatekeeper to organisation 

Guard Stations 
-Rich source of info and items
--Video footage
--Keys
--Badges
--Communication traffic 

Meeting Rooms 
-Empty meeting rooms can be valuable 
-Setup equipment
-Listen to office chatter
-A place to be
-Often not bothered 

Supervisor Offices
-Goldmine of info and assets
-More valuable info and assets than other employees
-Office can be used to imply authority over other employees

Server Rooms/Switch Closets 
-Often the main target of tests
-Snoop on network or implant devices
-May have all the organisation's data
-Gain network access and bypass security controls 

Storage Areas
-Big target for thieves 
-Lots of money in storage areas
-Multiple point of entry 

Examples of Access Methods 
Tailgating
-Following an authorised person in
-Credential are not needed
-Social norm of not being rude
-Trained to look for tailgaters 
-Act like you belong
-Be confident 
-Act like you just came out 
-Carry something big 

Clothing to Wear
-Dress like the group 
-Appropriate and believable digsuise
-Layers of disguises

Hiding in an Elevator
-low security locks
-Can get full control with firefighter setting
-Buildings with multiple elevators
-Close to closing time 

Comments

Popular Posts