Red Team Ethical Physical Penetration Testing Simulations using OSINT
This project explores the methodologies, challenges, and countermeasures associated with physical penetration testing in cybersecurity. It highlights real-world vulnerabilities in physical security systems and provides strategic recommendations for mitigating risks.
Our simulation involved a series objectives that needed to be explored in depth. Objectives included:
- Develop a hands-on, challenge-based approach to teach physical penetration testing to cybersecurity analysts.
- Explore how OSINT (Open-Source Intelligence) can be used to uncover physical security vulnerabilities.
- Identify and exploit real-world physical weaknesses using ethical red-team methodologies.
- Evaluate the effectiveness of training by comparing pre-test and post-test assessments.
- Promote security awareness through gamification to improve retention and learning outcomes.
- Identify vulnerabilities in physical security systems.
- Analyze real-world penetration testing methodologies.
- Develop strategies to mitigate physical security threats.
Our simulation involved a series of progressively complex challenges using real-world tactics. Techniques included:
- Reconnaissance via OSINT: Used Google Maps, Street View, and image analysis to locate facilities and entry points.
- Car Exploitation: Demonstrated Rolling PWN attacks on vulnerable key fobs using tools like Flipper Zero.
- Physical Infiltration: Developed realistic pretexts, blended in with employee uniforms, and identified entry timing strategies.
- Social Engineering: Exploited human empathy and trust to gather credentials and bypass access controls.
- RFID Cloning: Used Arduino-based tools and the Proxmark to clone badges and emulate access cards using the Wiegand protocol.
- Key Analysis: Identified bitting codes from photos and used lockpicking tools to create key duplicates from images.
- Access Control Bypass: Targeted outdated systems like Linear telephone entries and default factory codes to gain entry.
Our simulation revealed critical insights into real-world vulnerabilities and provided actionable recommendations:
- Implementing multi-layered physical security measures.
- Training employees to recognize social engineering tactics.
- Upgrading authentication mechanisms for access control.
- Many physical security systems remain vulnerable to default credentials, unpatched hardware, and outdated authentication mechanisms.
- Social engineering remains a high-impact vector and can often bypass even the most technical safeguards.
- Unmonitored surveillance systems significantly weaken the effectiveness of security infrastructure.
- Credential cloning and badge spoofing are viable threats without proper encryption and two-factor authentication (2FA).
- Physical access tools like Lishi picks, Proxmark, and ESPKey can defeat common locks and badge readers.
- Mitigations: Improve employee training, upgrade legacy access systems, encrypt RFID data, enforce no-photo policies, and deploy active camera monitoring.
📄 Project Documents
- 📂 Final Paper – Detailed research findings.
- 📊 Final Presentation – Summary of key points.
- 🏛️ Conference Overview – Condensed version for conference use.