During a physical pentest, you will very likely need to perform some aspects of cyber infiltration and compromise. These could be things like installing keyloggers, your own rogue access points, stealing sensitive files or installing man in the middle devices.
One thing that you will likely need to accomplish during the test is gaining access to an organization's internal network.
When attempting to do this from the internet, or even getting onto the wifi it can be tricky and sometimes not even possible to get onto the internal network if the target’s security measures are robust. The target probably spends a lot of money trying everything they can to prevent people from doing exactly what you are trying to accomplish after all. But all of these defenses assume one thing, that the attackers are coming from the internet or outside the target location, which is not true when doing a physical pentest.
What follows are a few tricks you can use to get onto a targets internal network and quickly bypass most, if not all, security protocols they have put in place.
Of course since this is a list of ways to bypass external cyber defenses, this is for educational purposes only.
Keep reading with a 7-day free trial
Subscribe to Covert Access Team to keep reading this post and get 7 days of free access to the full post archives.