Physical Red Team Operations

Talamantes, Jeremiah

Engage in Reconnaissance


Google Dorking (https://www.exploit-db.com/google-hacking-database)


unlike the principle of defense in depth common to the information security industry, most physical security departments have yet to adopt that strategy. So instead we see a lot of physical security controls implemented in only one or two layers, almost always outside the building (fencing, cameras).


The most effective tactic toward defeating UGS systems is by way of its responders. My team does this by creating several alarms to fool the responders into thinking there is a glitch in the system, which they later begin to ignore.


Aborting a mission goal is prone to happen and it shouldn’t be frowned upon. It’s probably a sign that the client is doing things right.