Physical Penetration Testing

Physical penetration testing simulates a real-world threat scenario where a malicious actor attempts to compromise a business’s physical barriers to gain access to infrastructure, buildings, systems, and employees. The goal of a physical penetration test is to expose weaknesses in a businesses’ overall physical defenses. Through identifying these weaknesses proper mitigations can be put in place to strengthen the physical security posture.

What Standards is our Methodology Based on?

RFID Cloning

If RFID access cards are in use, an RFID Cloner can be used to read the contents of an employee badge and create a duplicate badge which can be used for entry.

Tailgating

Tailgating involves following an employee into the building or having an authorized user open the door for a member of the attack team, potentially utilizing social engineering.

Physical Control Bypass

Triaxiom will attempt to gain access through bypassing the physical security controls in place. This includes setting off motion activated doors from the outside, using an under-the-door tool to open the door from the inside, or other various methods to bypass security mechanisms.

Social Engineering

Triaxiom may employ the use of social engineering to try to gain access to the facility. This may include pretending to be facility maintenance or a delivery driver, for example.

Test Network Jacks

Another important step in the physical penetration testing methodology is to check your active network jacks in meeting rooms and your company lobby. Often overlooked, unused active network jacks can be exploited by plugging in a wireless access point.

10+

Cybersecurity Projects

10+

Cybersecurity Experts

100%

Service
Guarantee

5

Loyal Customers

Need Your Data System Protected?

We provide professional cyber security to protect your infrastructure.