Covert Access Team

Covert Access Team

Share this post

Covert Access Team
Covert Access Team
The Art of Long-Term Infiltration: The Role of Persistence in Physical Security Assessments

The Art of Long-Term Infiltration: The Role of Persistence in Physical Security Assessments

Brian Harris's avatar
Brian Harris
Nov 27, 2023
∙ Paid
1

Share this post

Covert Access Team
Covert Access Team
The Art of Long-Term Infiltration: The Role of Persistence in Physical Security Assessments
1
Share

Physical penetration testing is an essential aspect of a comprehensive security strategy for any organization. Unlike its digital counterpart, physical penetration testing involves a hands-on approach, requiring the tester to physically infiltrate a building or facility to assess its security measures. One critical element in this process is the necessity for persistence within the target building. In this post, we'll explore why having extended access is crucial for a thorough and effective penetration test.

Understanding Persistence in Physical Penetration Testing

In the context of physical penetration testing, "persistence" refers to the ability of the tester to freely enter, exit, and move throughout the target building as they please, over an extended period. This unrestricted access is crucial for a comprehensive assessment and is achieved through various means. For instance, cloning an ID badge allows the tester to bypass electronic access controls just like an employee. Alternatively, faking credentials through social engineering, such as creating a fake work order or posing as a third-party consultant, can grant access without raising suspicion. Another method is lock impressioning, where the tester creates a copy of a physical key, allowing them to unlock doors discreetly. These techniques enable the tester to avoid reliance on opportunistic methods like tailgating, where they follow an employee into a restricted area. By establishing this level of persistence, the tester can operate under less pressure, reducing the risk of detection and increasing the thoroughness of the security assessment.

Keep reading with a 7-day free trial

Subscribe to Covert Access Team to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Brian Harris
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share