SlideShare a Scribd company logo
1 of 19
Hacking Techniques &
Intrusion Detection
Ali Al-Shemery
arabnix [at] gmail
All materials is licensed under a Creative Commons
“Share Alike” license.
• http://creativecommons.org/licenses/by-sa/3.0/
2
# whoami
• Ali Al-Shemery
• Ph.D., MS.c., and BS.c., Jordan
• More than 14 years of Technical Background (mainly
Linux/Unix and Infosec)
• Technical Instructor for more than 10 years (Infosec,
and Linux Courses)
• Hold more than 15 well known Technical Certificates
• Infosec & Linux are my main Interests
3
Physical Pentesting
What good is your firewall or IDS/IPS if I can
grab your box?
Outline – Physical Pentesting
• Intro.
• The Process
• Techniques
5
Overview
• A Physical Penetration Test identifies
the security weaknesses and
strengths of the client's physical
security.
• The goal of the test is to demonstrate
the existence or absence of
deficiencies in operating procedures
concerning physical security.
6
Continue…
Did You Know?
• Physical Security is often overlooked in
an organization
• Physical Security breaches can have the
same impact as computer breaches
• Physical Security Attack & Penetration
Tests should be conducted on high value
facilities and locations annually
• Physical Security Attack & Penetration
Tests should be conducted by qualified
personnel with years of experience
7
The Process
• Building an Operating Team
• Project Planning
• Rules of Engagement
• Conducting Preliminary Research
• Evaluating Risk
• The Test Plan
• Legal Issues and Documentation
8
Building an Operating Team
• Operator – all are operators
• Team Leader – onsite/HQ
• Coordinator or Planner – offsite/HQ
• Social Engineer
• Computer Intrusion Specialist
• Physical Security Specialist
• Surveillance Specialist
9
Project Planning
Plan your project, create a workflow to be sure that you cover all
aspects of the assignment. A recommended approach (Wil Sopp):
• Receiving the assignment – contracts signed and certain legal
formalities observed.
• Negotiating the Rules of Engagement – Define what you can and
can’t do during testing and their purpose is usually to limit testers
to a certain scope.
• Performing Preliminary Research – Pursue the initial IG phase.
– Determining Risk – Very important to accurately gauge the risk a
project poses both to the company and to the team members
executing it.
– Writing a Test Plan – A formal (but flexible) test plan is a good
idea from both project management and legal perspectives.
– Gathering Equipment – Important for the team to take gear
that’s appropriate to the test without being over encumbered.
• Providing documentation and legal requirements – Once the
planning stage is complete you will have a not insignificant amount
of documentation.
10
Rules of Engagement
• Determine areas of security the client considers to be weak and
wants tested.
• Determine areas of testing the client wishes to avoid for legal
reasons, such as close surveillance of staff.
• Agree on team members that will carry out testing (Clearances might
not be given to all).
• Agree on test duration, or the maximum time permitted.
• Agree about the information given in advance {white, grey, black}
box testing.
• Agree on the target assets (overall goals): something the team must
acquire, identify, gain access to, or photograph. Examples include
network operation centers, passwords or target personnel.
• Agree on test success, failure, and abortion circumstances.
• Agree on the actions to be taken directly following successful, failed
and aborted tests.
• Determine a schedule for presentation and post testing report.
• After agreement is reached, document the RoE to be added to the
project documentation.
11
Conducting Preliminary
Research
• Human Intelligence (HUMINT).
• Signals Intelligence (SIGINT).
• Open Source Intelligence (OSINT).
• Imagery Intelligence (IMINT).
12
Evaluating Risk
• Team leader’s responsibility to determine what constitutes an
acceptable level of project risk. If level of risk is too high then
the RoE should be reassessed or the test should not be
carried out.
RISK acronym – COLE:
• Contractual Risks
– Unable to complete assingment
• Operational Risks
– Inexperienced team members, technical communication failure
• Legal Risks
– Getting arrested
• Environmental Risks
– Presence of machinery or high voltage
– Climbing and falling
– Guard dogs
– Extremes of heat or cold
– Confronting armed security
13
The Test Plan
• Strategic:
– High-level view of the project that details
the goals, assets, team members,
potential COLE risks, and necessary
equipment.
• Tactical:
– List of milestones and the order of
completion.
• Operational:
– Requirements to complete each milestone
and how its completion will affect the
whole engagement.
14
Legal Issues and
Documentation
Includes but not limited to:
• RoE
• Test plan
• Signed contracts
• Copies of ‘get out of jail free’ cards
• Scan of official ID of operating team
members (passport, driving license)
15
Techniques
• Practical physical security testing
• Site exploration
• Tactical approaches
– Tailgating to Gain Entry
– Clothes Maketh the Man
– Visiting a Nonexistent Employee
• Badge security
• Security mechanisms
16
Physical Pentesting
• Countermeasure
• Mitigation
• Remediation
17
?
SUMMARY
• The importance of physical penetration
testing, and why it must not be overseen,
• Howto prepare for a physical pentesting,
• Techniques used for physical pentesting,
• Countermeasures, Mitigation, and
Remediation for physical pentesting.
18
References
[-] Lock picking info., http://www.lockwiki.com/index.php/Main_Page
[-] Lock picking tools, http://toool.us/
[-] Learn Lock Picking, http://www.learnlockpicking.com
[-] Video on Lock picking, http://video.google.com/videoplay?docid=-
8536478434720082857&ei=8sKpSrG0J5jqqwK4tsytAw&q=lock+picking+phy
sical+security&hl=en
[-] Journal of Physical Security (JPS), http://jps.anl.gov/
[-] Hardware Tools for Physical Pentesting,
http://www.darkreading.com/vulnerability-
management/167901026/security/vulnerabilities/231600749/tech-insight-
three-hardware-tools-for-physical-penetration-testing.html
19

More Related Content

Similar to HfghjgghjfDay02-Physical Pentesting.pptx

FS-ISAC 2019 - Building an Effective Red Team Program 07/08/2019
FS-ISAC 2019 - Building an Effective Red Team Program 07/08/2019FS-ISAC 2019 - Building an Effective Red Team Program 07/08/2019
FS-ISAC 2019 - Building an Effective Red Team Program 07/08/2019Saeid Atabaki
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
 
Penentration testing
Penentration testingPenentration testing
Penentration testingtahreemsaleem
 
5 Ways to Reduce 3rd Party Developer Risk
5 Ways to Reduce 3rd Party Developer Risk5 Ways to Reduce 3rd Party Developer Risk
5 Ways to Reduce 3rd Party Developer RiskSecurity Innovation
 
Top Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayChris Gates
 
Process Safety Awareness | PSM | Gaurav Singh Rajput
Process Safety Awareness | PSM | Gaurav Singh RajputProcess Safety Awareness | PSM | Gaurav Singh Rajput
Process Safety Awareness | PSM | Gaurav Singh RajputGaurav Singh Rajput
 
Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItTerra Verde
 
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Resilient Systems
 
Safety webinar with mark friend
Safety webinar with mark friendSafety webinar with mark friend
Safety webinar with mark friendERAUWebinars
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramCarl C. Manion
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Association for Project Management
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"WrikeTechClub
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.pptit160320737038
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)Andrew Case
 

Similar to HfghjgghjfDay02-Physical Pentesting.pptx (20)

9780840024220 ppt ch12
9780840024220 ppt ch129780840024220 ppt ch12
9780840024220 ppt ch12
 
FS-ISAC 2019 - Building an Effective Red Team Program 07/08/2019
FS-ISAC 2019 - Building an Effective Red Team Program 07/08/2019FS-ISAC 2019 - Building an Effective Red Team Program 07/08/2019
FS-ISAC 2019 - Building an Effective Red Team Program 07/08/2019
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Penentration testing
Penentration testingPenentration testing
Penentration testing
 
5 Ways to Reduce 3rd Party Developer Risk
5 Ways to Reduce 3rd Party Developer Risk5 Ways to Reduce 3rd Party Developer Risk
5 Ways to Reduce 3rd Party Developer Risk
 
Top Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions Today
 
Process Safety Awareness | PSM | Gaurav Singh Rajput
Process Safety Awareness | PSM | Gaurav Singh RajputProcess Safety Awareness | PSM | Gaurav Singh Rajput
Process Safety Awareness | PSM | Gaurav Singh Rajput
 
Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs It
 
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
 
Safety webinar with mark friend
Safety webinar with mark friendSafety webinar with mark friend
Safety webinar with mark friend
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting Program
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)
 

Recently uploaded

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 

Recently uploaded (20)

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 

HfghjgghjfDay02-Physical Pentesting.pptx

  • 1. Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail
  • 2. All materials is licensed under a Creative Commons “Share Alike” license. • http://creativecommons.org/licenses/by-sa/3.0/ 2
  • 3. # whoami • Ali Al-Shemery • Ph.D., MS.c., and BS.c., Jordan • More than 14 years of Technical Background (mainly Linux/Unix and Infosec) • Technical Instructor for more than 10 years (Infosec, and Linux Courses) • Hold more than 15 well known Technical Certificates • Infosec & Linux are my main Interests 3
  • 4. Physical Pentesting What good is your firewall or IDS/IPS if I can grab your box?
  • 5. Outline – Physical Pentesting • Intro. • The Process • Techniques 5
  • 6. Overview • A Physical Penetration Test identifies the security weaknesses and strengths of the client's physical security. • The goal of the test is to demonstrate the existence or absence of deficiencies in operating procedures concerning physical security. 6
  • 7. Continue… Did You Know? • Physical Security is often overlooked in an organization • Physical Security breaches can have the same impact as computer breaches • Physical Security Attack & Penetration Tests should be conducted on high value facilities and locations annually • Physical Security Attack & Penetration Tests should be conducted by qualified personnel with years of experience 7
  • 8. The Process • Building an Operating Team • Project Planning • Rules of Engagement • Conducting Preliminary Research • Evaluating Risk • The Test Plan • Legal Issues and Documentation 8
  • 9. Building an Operating Team • Operator – all are operators • Team Leader – onsite/HQ • Coordinator or Planner – offsite/HQ • Social Engineer • Computer Intrusion Specialist • Physical Security Specialist • Surveillance Specialist 9
  • 10. Project Planning Plan your project, create a workflow to be sure that you cover all aspects of the assignment. A recommended approach (Wil Sopp): • Receiving the assignment – contracts signed and certain legal formalities observed. • Negotiating the Rules of Engagement – Define what you can and can’t do during testing and their purpose is usually to limit testers to a certain scope. • Performing Preliminary Research – Pursue the initial IG phase. – Determining Risk – Very important to accurately gauge the risk a project poses both to the company and to the team members executing it. – Writing a Test Plan – A formal (but flexible) test plan is a good idea from both project management and legal perspectives. – Gathering Equipment – Important for the team to take gear that’s appropriate to the test without being over encumbered. • Providing documentation and legal requirements – Once the planning stage is complete you will have a not insignificant amount of documentation. 10
  • 11. Rules of Engagement • Determine areas of security the client considers to be weak and wants tested. • Determine areas of testing the client wishes to avoid for legal reasons, such as close surveillance of staff. • Agree on team members that will carry out testing (Clearances might not be given to all). • Agree on test duration, or the maximum time permitted. • Agree about the information given in advance {white, grey, black} box testing. • Agree on the target assets (overall goals): something the team must acquire, identify, gain access to, or photograph. Examples include network operation centers, passwords or target personnel. • Agree on test success, failure, and abortion circumstances. • Agree on the actions to be taken directly following successful, failed and aborted tests. • Determine a schedule for presentation and post testing report. • After agreement is reached, document the RoE to be added to the project documentation. 11
  • 12. Conducting Preliminary Research • Human Intelligence (HUMINT). • Signals Intelligence (SIGINT). • Open Source Intelligence (OSINT). • Imagery Intelligence (IMINT). 12
  • 13. Evaluating Risk • Team leader’s responsibility to determine what constitutes an acceptable level of project risk. If level of risk is too high then the RoE should be reassessed or the test should not be carried out. RISK acronym – COLE: • Contractual Risks – Unable to complete assingment • Operational Risks – Inexperienced team members, technical communication failure • Legal Risks – Getting arrested • Environmental Risks – Presence of machinery or high voltage – Climbing and falling – Guard dogs – Extremes of heat or cold – Confronting armed security 13
  • 14. The Test Plan • Strategic: – High-level view of the project that details the goals, assets, team members, potential COLE risks, and necessary equipment. • Tactical: – List of milestones and the order of completion. • Operational: – Requirements to complete each milestone and how its completion will affect the whole engagement. 14
  • 15. Legal Issues and Documentation Includes but not limited to: • RoE • Test plan • Signed contracts • Copies of ‘get out of jail free’ cards • Scan of official ID of operating team members (passport, driving license) 15
  • 16. Techniques • Practical physical security testing • Site exploration • Tactical approaches – Tailgating to Gain Entry – Clothes Maketh the Man – Visiting a Nonexistent Employee • Badge security • Security mechanisms 16
  • 17. Physical Pentesting • Countermeasure • Mitigation • Remediation 17 ?
  • 18. SUMMARY • The importance of physical penetration testing, and why it must not be overseen, • Howto prepare for a physical pentesting, • Techniques used for physical pentesting, • Countermeasures, Mitigation, and Remediation for physical pentesting. 18
  • 19. References [-] Lock picking info., http://www.lockwiki.com/index.php/Main_Page [-] Lock picking tools, http://toool.us/ [-] Learn Lock Picking, http://www.learnlockpicking.com [-] Video on Lock picking, http://video.google.com/videoplay?docid=- 8536478434720082857&ei=8sKpSrG0J5jqqwK4tsytAw&q=lock+picking+phy sical+security&hl=en [-] Journal of Physical Security (JPS), http://jps.anl.gov/ [-] Hardware Tools for Physical Pentesting, http://www.darkreading.com/vulnerability- management/167901026/security/vulnerabilities/231600749/tech-insight- three-hardware-tools-for-physical-penetration-testing.html 19