Red Team Ethical Physical Penetration Testing Simulations using OSINT


This project explores the methodologies, challenges, and countermeasures associated with physical penetration testing in cybersecurity. It highlights real-world vulnerabilities in physical security systems and provides strategic recommendations for mitigating risks.

Our simulation involved a series objectives that needed to be explored in depth. Objectives included:

  • Develop a hands-on, challenge-based approach to teach physical penetration testing to cybersecurity analysts.
  • Explore how OSINT (Open-Source Intelligence) can be used to uncover physical security vulnerabilities.
  • Identify and exploit real-world physical weaknesses using ethical red-team methodologies.
  • Evaluate the effectiveness of training by comparing pre-test and post-test assessments.
  • Promote security awareness through gamification to improve retention and learning outcomes.
  • Identify vulnerabilities in physical security systems.
  • Analyze real-world penetration testing methodologies.
  • Develop strategies to mitigate physical security threats.

Our simulation involved a series of progressively complex challenges using real-world tactics. Techniques included:

  • Reconnaissance via OSINT: Used Google Maps, Street View, and image analysis to locate facilities and entry points.
  • Car Exploitation: Demonstrated Rolling PWN attacks on vulnerable key fobs using tools like Flipper Zero.
  • Physical Infiltration: Developed realistic pretexts, blended in with employee uniforms, and identified entry timing strategies.
  • Social Engineering: Exploited human empathy and trust to gather credentials and bypass access controls.
  • RFID Cloning: Used Arduino-based tools and the Proxmark to clone badges and emulate access cards using the Wiegand protocol.
  • Key Analysis: Identified bitting codes from photos and used lockpicking tools to create key duplicates from images.
  • Access Control Bypass: Targeted outdated systems like Linear telephone entries and default factory codes to gain entry.

Our simulation revealed critical insights into real-world vulnerabilities and provided actionable recommendations:

  • Implementing multi-layered physical security measures.
  • Training employees to recognize social engineering tactics.
  • Upgrading authentication mechanisms for access control.
  • Many physical security systems remain vulnerable to default credentials, unpatched hardware, and outdated authentication mechanisms.
  • Social engineering remains a high-impact vector and can often bypass even the most technical safeguards.
  • Unmonitored surveillance systems significantly weaken the effectiveness of security infrastructure.
  • Credential cloning and badge spoofing are viable threats without proper encryption and two-factor authentication (2FA).
  • Physical access tools like Lishi picks, Proxmark, and ESPKey can defeat common locks and badge readers.
  • Mitigations: Improve employee training, upgrade legacy access systems, encrypt RFID data, enforce no-photo policies, and deploy active camera monitoring.

📄 Project Documents