Physical exposure

Another thing we do in every red team is to assess the possibility of installing physical devices in the target organization's network.

A typical device could be a Raspberry Pi with features such as mobile broadband, wireless, Ethernet port, and so on:

The device will be configured to act as a network bridge, and as soon as it is connected we have the possibility to access the internal network.

The common security implementation to mitigate the connection unauthorized devices is 802.1X. Because of that, we always install the device between the network port and some already-connected device. Most of the time we prefer to look ...

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.