CHAPTER
9
Physical Infiltration
In this phase, we will start, as always, by extending our reconnaissance to be sure we have all of the relevant information about the target locations. We will choose our target physical locations based on this recon information as well as the likelihood that an intermediate target asset will be located there.
We’ll also take into consideration any physical security controls we’ve identified, as well as any we’re likely to encounter based on what we already know about the organization. Finally, you’ll choose the location or locations to enter that are likely to provide assets or viable lily pads. Before entering the target facility, we’ll prepare for our few intermediate goals, which will be to
Bug a key ...
Get Advanced Persistent Threat Hacking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.