4B: Summarize Physical Attacks Flashcards
3.6 Given a scenario, perform a social engineering or physical attack.
Natural barriers or fences to deter someone from simply entering the property.
Perimeter Security
Secure entry system with two gateways, only one of which is open at any one time.
Mantrap
Means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else.
RFID (Radio Frequency Identification)
Scanner that reads data from an RFID or NFC tag when in range.
Proximity Reader
A standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances, facilitating contactless payment and similar technologies (based on RFID).
NFC (Near Field Communication)
Copying authentication data from an RFID badge’s microchip to another badge, which can be done through handheld RFID writers, which are inexpensive and easy to use.
Badge Cloning
Social engineering technique to gain access to a building by following someone who is unaware of their presence.
Tailgating
Allowing a threat actor to enter a site or controlled location without authorization.
Piggybacking