Physical Security attacks tools Clause Samples
Physical Security attacks tools. The effective execution of physical SE attacks requires particular impersonation and deception skills. Besides these skills, attackers may use some tools to capture, record and exfiltrate information, or to track someone’s location. Listening devices: Hidden microphones or long distance directional microphones are used to covertly listen to conversations, and for a social engineer they can be useful to learn about a potential victim and prepare the attack more thoroughly; Cameras: They can be used to capture information by taking photos or recording videos, for example: o Cell phones – Nowadays cameras are commonly present in cell phones and are an easy to use o Covert/ hidden – There are some compact and covert cameras that look like a button or a screw and some of them can even be hidden in a pen [168][169]; o Streaming services are used to send captured data directly to a hard-to-trace web location. GPS Tracker: GPS trackers open up the possibility of tracking the victim’s location and learning about their routines. This kind of device is usually attached to some vehicle and can be triggered by the vehicle movement. Data can be transmitted remotely (using embedded cell data or SMS modules) or offline (local access after recovering the device) [170]; Malware on smartphones and personal computers: This is another possible way to acquire valuable information. If there is something that the social engineer can guess the possibility that his victim has a smartphone and possibly often uses a personal computer. Those devices are present in our daily lives and they are powerful tools with integrated cameras, microphones and position tracking capabilities, a part from internet access. Applications used on smartphones and personal computers that have been given permission to access device features can be infected with malware allowing potential control of the victim’s device. If a social engineer can convince a victim to install a malicious app, they can activate to be able to intercept communications and/or remotely activate audio, video, etc.
