Because the quickest way into your network might be through the front door
Cyber‑security isn’t purely digital. If an attacker can stroll past reception, clone a swipe‑card or plant a rogue device behind the firewall, it’s game over. Our physical penetration tests replicate those real‑world tactics — tailgating, social‑engineering, badge cloning, lock‑picking and covert hardware placement — to reveal the gaps in your buildings, policies and people before somebody else does.
“Swipe cards feel secure, yet cards go missing constantly.”
Badge cloning & RFID replay — we duplicate proximity cards and test whether systems spot the fraud.
“Server rooms look solid; are they really?”
Lock‑picking & bypass — test door hardware, hinges and hinges, identify shimming or impressioning weaknesses.
“What if someone hides a rogue Pi under a desk?”
Covert device placement — aim to install network implants, key‑loggers or hidden cameras, then prove remote reach‑back.
Scoping & rules of engagement — agree objectives, legal cover, escalation paths and safety words.
Open‑source intelligence (OSINT) — profile staff, public photos, badge designs and delivery procedures.
On‑site reconnaissance — observe shift patterns, CCTV coverage, guard routines and emergency exits.
Active infiltration attempts — impersonation, uniform cloning, visitor‑badge requests, badge cloning, door bypass, roof/maintenance entry, lift shaft exploration.
Covert hardware operations — plant network implants or data exfil devices; log exact dwell time.
Evidence collection — HD photos, timestamped videos, cloned access tokens, log extracts.
Risk‑prioritised report — executive summary, narrative of attacks, heat‑map of vulnerabilities, remediation ranked by cost vs impact.
Board‑level debrief — walk through footage, discuss cultural hurdles, plan fixes.
Kick‑off — NDA, brief with security & HR, emergency contacts locked in.
OSINT & recon — gather intel, stake‑out entrances, map guard tours.
Infiltration phase — multiple entry attempts during shift changes, lunch, night shift.
Objective execution — reach agreed crown‑jewels: data centre rack, CEO’s desk, finance cabinets.
Plant & persist — hide implants, exfil over 4G, observe detection mechanisms.
Exfil & clean‑up — remove any devices, leave premises tidy, debrief duty manager.
Reporting & evidence hand‑over — draft report delivered, video/photos transferred securely.
Close the digital / physical gap — ensure firewalls aren’t bypassed by unlocked doors.
Prove compliance & due diligence — strong evidence for ISO 27001, SOC 2, PCI DSS and insurance renewals.
Strengthen culture & processes — real incidents spark far more change than posters on a wall.
Quantify ROI on physical controls — validate turnstiles, cameras, guards and alarm investments.
Is this legal?
Yes. We work under a signed contract, scope and “get‑out‑of‑jail” letter authorised by senior leadership.
Will staff be informed?
To keep results genuine, only a need‑to‑know circle is briefed. After the test, we can help security teams run controlled comms.
Could someone get hurt?
Safety is paramount. We never use force, hazardous tools or create situations that endanger staff or testers.
What about CCTV and alarm logs?
We request copies so we can show whether the SOC spotted our movements; this forms part of the final report.