Optiv Security
BOLO
Black Hills Information Security
CAVEATS
All of the above are the perfect ingredients for a smooth, effective, and impact Facility Breach
Let's dive into the weeds a bit...
Things to look for:
Search the following:
Search the following:
Leverage this information to assist in an SE scenario or to talk your way out of getting caught.
| ACTION | ACTIONS | NOTES |
|---|---|---|
| Arial Map Analysis | - Determine the general layout of the facility/campus. - Determine employee density through analysis of the parking lot/structure size. - Identify nearby establishments that employees may frequent. - Traffic patterns in and out of the area |
Use various mapping sources (.e.g, ArcGIS, Bing, Google Maps/Earth, etc.) |
| Street View Map Analysis | - Identify camera placement & viewing angles. - Chokepoints that can be leveraged for badge cloning - Areas that might be best situated for in-person surveillance - Parking and facility ingress/egress points |
Can you determine the location of trash recipticals or security staging locations? |
Google Maps
Bing Maps
ArcGIS
Attack Path Planning
On-Site Surveillance Staging
Mobile Recon Types
Tooling
Body Posture
Tooling
Considerations
Employees
Guards / Service Providers
Security Cameras / Controls
Reader Protocol (e.g., Prox. EM, iCLASS, multiCLASS)
Facility
Security Cameras
Reader Protocol (e.g., Prox. EM, iCLASS, multiCLASS)
Facility
Mechanical Lock Types
Motion Sensors
Floor / Parking Area Access
Tools
Considerations
Compilation of remote & on-site recon to determine the most likely path to success with the least resistance while remaining within the limits and intent of the engagement.
| Attack Scenario | Observations | Effort | Risk |
|---|---|---|---|
| Badge Cloning | - Employees expose badges outside the facility - Facility uses cloneable access card technology - Coffee house directly adjacent to facility |
- Off-site staging is possible - Cloning efforts can occur in line or at multiple chokepoints - Long-range reader required |
- Risk of discovery if too close - Risk of discovery off-site - Chance of RF interference - Chance of capturing third-party access card crendentials |
| Social Engineering | - Building is adequately hardened (e.g., bio-metrics, anti-piggy backing controls, etc.) - XYZ service vendor performing facility repairs - Limited access widow for testing |
- Telephony spoofing for pre-validation (client employee) - Telephony spoofing for pre-validation (XYZ vendor) - Pose as XYZ oversight manager - Create a replica vendor ID card/business card, etc. - Off-site validation |
- Direct exposure to security guard - Only one chance at success - Pre-validation fails - BOLO |
| Surreptitious Entry | - Access to unprotected door on second story balcony | - Use of ladder/rope/grappling hook - Limited to after-hours |
- Roaming guards - Possible view from a wide-angle security camera - Exposure from overhead lighting |
| Engagement Goal | Required Tooling | Timeline | Cover Story |
|---|---|---|---|
| Gain access to the production floor and access intellectual property | - HID Prox reader w/doppelganger for cloning - Proxmark3 for writing card data - Replica ID Card - Method to unlock / shell workstation or drop-device - UDT & Lockpicks? - Authorization Letter |
Complete: Create Replica Badge (found on Insta) 08:00-08:30: Arrive at off-site location for cloning 09:00-11:00: Write cloned card data, validate drop device works, finalize cover story 12:30-12:45: Enter the facility during lunch, identify the production floor location, and plant the device/shell workstation if possible 13:00: Depart facility |
Sent from XYZ department to investigate malfunctioning widget that was generating alerts. |
Badge Cloning
Three Days / Tampa, FL
- Pre-sales & Authorization
- Remote Reconnaissance
- Digital Surveillance
- Surreptitious Entry Tactics
- Badge Cloning & Replication
- Post-Exploitation
- Live Facility Breach Exercise
Upcoming Dates (2024):
May 8 - 10
July 17 - 19
October 16 - 18
PRIVATE TRAINING AVAILABLE