Black Hills Information Security
BOLO
Optiv Security
Do's and Don'ts of Planning
Actions are always determined by the client's intent, and they should align with the engagement type.
| Engagement Type | Intent / Goals | Authorized Actions |
|---|---|---|
| Facility Breach (Opportunistic Approach) | Gain access to the power XYZ distribution plant | Badge Replication Badge Cloning Seruptitous Entry Access Control Bypass Lock-picking Social Engineering Tailgating / Piggy-backing Digital Exploitation? (e.g., remote red team) |
| Social Engineering | Influence security staff to grant access to the facility | * Impersonation of employees/vendors Badge Replication Tailgating |
| Tailgating | Assess newly installed anti-piggybacking controls | Badge Replication Tailgating / Piggy-backing |
* Impersonating a local/federal government employee/agency is against the law and will land you in jail
| Engagement Type | Authorized Actions | Out of Scope / Off-limits |
|---|---|---|
| Facility Breach (Opportunistic Approach) | Badge Replication Badge Cloning Seruptitous Entry Access Control Bypass Lock-picking Social Engineering Tailgating / Piggy-backing Digital Exploitation? (e.g., remote red team) |
Removal of employee/client documents/electronics Accessing the CEO's office Picking the loading dock door |
| Social Engineering | * Impersonation of employees/vendors Badge Replication Tailgating |
Impersonation of local/federal government employee/agency Escalation/redirection, if discovered |
| Tailgating | Badge Replication Tailgating / Piggy-backing |
Tailgating into doors past the initial point of ingress/egress |
While certain engagement types typically involve specific actions, allow the client to determine what is authorized based on their comfort level.
Must have items (ideally on a single page):
Authorization & Access Form / Letter of Authorization
| ACTION | ACTIONS | NOTES |
|---|---|---|
| Arial Map Analysis | - Determine the general layout of the facility/campus. - Determine employee density through analysis of the parking lot/structure size. - Identify nearby establishments that employees may frequent. - Traffic patterns in and out of the area |
Use various mapping sources (.e.g, ArcGIS, Bing, Google Maps/Earth, etc.) |
| Street View Map Analysis | - Identify camera placement & viewing angles. - Chokepoints that can be leveraged for badge cloning - Areas that might be best situated for in-person surveillance - Parking and facility ingress/egress points |
Can you determine the location of trash recipticals or security staging locations? |
| ACTION | INTENT | NOTES |
|---|---|---|
| Instagram: Badge Brand & Layout | Search company name, address, and hashtags and follow the rabbit hole. | The intent is to make a replica badge before ever stepping foot on-site. |
| LinkedIn/Company Website | Identify personas that can be used during social engineering. | Capture names, department structure, contact information, technologies, open positions, subsidiaries, other locations. |
Understand the location and prepare for any compliance-driven safety requirements:
| Industry | Regulating Organization | Might Need |
|---|---|---|
| Power Distribution | OSHA Part 1910 | Hardhat, Gloves, Safety Glasses, Boots, etc. |
| Healthcare | NIOSH/OSHA/CDC | Mask, lab coat, safety glasses, gloves, etc. |
Digital Access Controls
Easily Bypassed Controls
Compilation of remote & on-site recon to determine the most likely path to success with the least resistance while remaining within the limits and intent of the engagement.
| Attack Scenario | Observations | Effort | Risk |
|---|---|---|---|
| Badge Cloning | - Employees expose badges outside the facility - Facility uses cloneable access card technology - Coffee house directly adjacent to facility |
- Off-site staging is possible - Cloning efforts can occur in line or at multiple chokepoints - Long-range reader required |
- Risk of discovery if too close - Risk of discovery off-site - Chance of RF interference - Chance of capturing third-party access card crendentials |
| Social Engineering | - Building is adequately hardened (e.g., bio-metrics, anti-piggy backing controls, etc.) - XYZ service vendor performing facility repairs - Limited access widow for testing |
- Telephony spoofing for pre-validation (client employee) - Telephony spoofing for pre-validation (XYZ vendor) - Pose as XYZ oversight manager - Create a replica vendor ID card/business card, etc. - Off-site validation |
- Direct exposure to security guard - Only one chance at success - Pre-validation fails - BOLO |
| Surreptitious Entry | - Access to unprotected door on second story balcony | - Use of ladder/rope/grappling hook - Limited to after-hours |
- Roaming guards - Possible view from a wide-angle security camera - Exposure from overhead lighting |
Badge Cloning
| Engagement Goal | Required Tooling | Timeline | Cover Story |
|---|---|---|---|
| Gain access to the production floor and access intellectual property | - HID Prox reader w/doppelganger for cloning - Proxmark3 / iCopy-XS for writing card data - Replica ID Card - Method to unlock / shell workstation or drop-device - Authorization Letter |
Complete: Create Replica Badge (found on Insta) 08:00-08:30: Arrive Coffee Shop for cloning 09:00-11:00: Write cloned card data, validate drop device works, finalize cover story 12:30-12:45: Enter the facility during lunch, identify the production floor location, and plant the device/shell workstation if possible 13:00: Depart facility |
Sent from XYZ department to investigate malfunctioning widget that was generating alerts. |
I'm in now what?
Tips for success:
If you're in, the impact of access has been illustrated.
| Goal / Intent | Example Scenario | Impactful Evidence |
|---|---|---|
| - Access to People - Concerned about active shooters |
News organization wanted to see if it was possible to access reports while on-air. | - Photographs inside the newsroom - Photographs near/around the motor pool |
| - Network Compromise - Damage to SCADA equipment |
Power Distribution company wanted to see if it was possible to gain physical/remote access to SCADA equipment. | - Drop device planted within the SCADA environment - Photographs of equipment / office space |
| - System Compromise - Loss of money / ransomware |
Client wanted to see if it was possible to gain access to air-gapped systems inside of a SCIF. | - Pre-boot authentication? Kon-boot? - Mock ransomware install - Bidged drop device (e.g., ethernet to wifi with secure tunnel) |
GET OUT!
Be clear and to the point:
Be clear and to the point:
Avoid legal issues & prevent "he said/she said" situations
Three Days / Tampa, FL
- Project Scoping, Legal Protections, Documentation
- Remote Reconnaissance
- Digital Surveillance
- Serruptitous Entry Tactics
- Badge Cloning & Replication
- Post-Exploitation
- Live Physical Exploitation (CAPEX)
Practical Physical Exploitation Kit
Everything you need to get going, without the fluff and endless days of resourcing, soldering, and troubleshooting.