From: Levenglick, Jeff (JLevenglick@fhlbatl.com)
Date: Mon Jul 31 2006 - 13:59:47 EDT
If you do have the experience, then based on your email they asked about
Pen testing the physical security system. So, you need to focus on:
Cameras - inside/outside. Can they be moved? blind spots? Who looks at
them and how? (ie: all the time or just once in a while) Are they being
written to tape?
If someone is watching the camera - Can you call and distract them?
How well are the cameras in the dark? (ie: outside - do they function
well in the dark. Inside - if a few lights blew, will the camera still
work)
Gates - can someone move or climb them? Are the cameras trained on them.
If there is a keypad on the gate- can someone read the numbers while a
person is keying them in? (ie: you hide out of site with a
camera/binoculars and read the numbers that someone is typing in)
Are the gates tied in to anything? Ie: a computer records entry/exit ids
and times.
Guards - how many? Do they cover each other or is there a gap.
Doors/elevator - secure floors or all floors open?
Stairs - open to every floor or locked?
Server room - secure or open...ect...
Hubs/switches on floors - open/secure. Can anybody connect something to
the hub/switch or do they have port security on?
Anything wireless?
-----Original Message-----
From: scott [mailto:redhowlingwolves@bellsouth.net]
Sent: Monday, July 31, 2006 12:49 AM
To: pen-test@securityfocus.com
Subject: pentest physical security
Hi,all.
Okay,I've been contacted about pentesting physical security system for
a medium size company that is integrating IT & physical
security,ie;cameras,id gates,etc.
I'm not exactly sure where to start,other than the
obvious;passwords,permissions,etc.
Anyone have good ideas to help with this one?
Thanks in advance, Scott
------------------------------------------------------------------------
------
This List Sponsored by: Cenzic
Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the
Analyst's
Choice Award from eWeek. As attacks through web applications continue to
rise,
you need to proactively protect your applications from hackers. Cenzic
has the
most comprehensive solutions to meet your application security
penetration
testing and vulnerability management needs. You have an option to go
with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service
can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm
your
results from other product. Contact us at request@cenzic.com for
details.
------------------------------------------------------------------------
------
-----------------------------------------
This e-mail message is private and may contain confidential or
privileged information.
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:28 EDT