Let's Get Physical
54 points
1 hour ago
| 6 comments
| m4iler.cloud
| HN
illithid0
1 hour ago
[-]
From one red teamer to red teamer to another, glad your first assessment went so well and you had a great time. My first physical pentest made me want to never sit in front of a terminal again.

People, as we like to say, are not paid enough to care. At-will employment, company-sponsored healthcare, etc. have employees so focused on their own wellbeing that protecting "the company" is the last thing on their minds, and I can't really blame them. That lady who you barged in on may very well have just been used to micromanaging jerks doing it to her all the time, so she has to seem busy.

Physical security, in my experience, comes down to giving people something to protect which actually benefits them to protect. All the technical controls in the building can fail and one person with enough skin in the game can kill an intrusion attempt in seconds.

reply
sillysaurusx
1 hour ago
[-]
I want to hear about your first assessment please! (Former pentester here. I never got to do a physical red team but always daydreamed about it.)
reply
illithid0
44 minutes ago
[-]
My first assessment was honestly as anticlimactic as OP's.

We had to break into a particular unit of a multi-tenant office building. The client wanted us to focus on social engineering, but if we were able to do that, to move on to testing if anyone would see it as suspicious if someone was messing with doors and stuff.

So my partner walked up to the reception desk with a toolbox and a clipboard, claiming to be there for an off-schedule inspection of the elevator fire suppression system. Signed the guestbook with no formal verification, walked into the office area, and sat down to plug his laptop into an ethernet drop.

Meanwhile, after he texted me to let me know he was in, I took the stairs up to a door that led into the back of the target unit and just had to use a traveler's hook to pull door latch open. No guard plates or anything in the way.

Then I walked around in my business casual outfit until I found what looked like an IT closet, waited for a time when no one was in the hall with me, and used an under-the-door tool to pop it open. All their network equipment was in there along with spare laptops and an unlocked IT admin machine on a desk.

:)

reply
nathan_douglas
11 minutes ago
[-]
Great stuff. I love that there's this kind of modern noir tone to the writing.

> I wanted to try and see if we could bypass the door entirely, and that’s where the canned air comes in. If you turn a can of compressed air upside down, it starts “boiling off cold gases.” These are not harmful in open spaces, and their temperature is well below freezing point even when gaseous. This can trigger a sensor that checks for temperature increases: First it sees a drop to -50C, thinks “Baby, it’s cold outside.” Then, the temperature starts rising again, and the sensor thinks “Oh, temperature going up?! Must be a human!” and opens the door. If this works, I will update my Mastodon. If it doesn’t, well I can still walk in after someone, so it’s a finding nonetheless.

I enjoyed it a lot.

reply
jgilias
16 minutes ago
[-]
Many moons ago I worked a job that involved physical on-premise installations of different equipment. That’s when I learned that for access all that’s needed is often a toolbox, an attitude that you belong there, and a friendly hi to the security guy if you stumble upon one. Not always (and then you actually being authorised helps), but often enough.
reply
crowfunder
10 minutes ago
[-]
This post was so engaging to read, it felt like the best war-story you'd randomly hear in the break room. Gotta check out the rest of OP's posts.
reply
simlevesque
1 hour ago
[-]
I love pentesting stories. Great blog post, I was smiling while reading most of it.

It reminded me of Deviant Ollam's stories such has his elevator security talk w/ Howard Payne: https://www.youtube.com/watch?v=oHf1vD5_b5I

reply
totallygeeky
55 minutes ago
[-]
Pentesting seems like a hoot, love to see these stories!
reply