Dirty Deeds…. On Video

Recently the team and I were engaged in a physical penetration test where our goal was to gain access to […]

Identity Legitimacy: Making Your Own ID Badge

A big part of performing any sort of physical penetration assessment involves a little bit of social engineering. More often […]

Pretexting: Your Targets Want to, They Just Don’t Know it Yet

When conducting a social engineering engagement, be it in person or remote, your pretext can mean life or death for […]

Personal Preparation for Active Shooter Events

It’s an uncomfortable topic to address, and this is certainly a change in tone for the War Room. But unfortunately, […]

Create an Encrypted Leave-Behind Device

Consider this scenario:  You’ve breached the physical perimeter of the target organization.  Once inside, you need to establish some means […]

Bypassing Common Physical Security Interior Controls

A few months ago, I wrote a post about some of the simple techniques we use to get around common […]