PSE & Red Team Series: OSINT & Reconnaissance

Categories: , ,

Posted on

By

PSE & Red Team Series: OSINT & Reconnaissance

As a penetration tester at Raxis, I enjoy (legally) hacking into customer systems and providing them with the knowledge to correct the issues I discover so that they can fix them before the bad guys find them. In the real world, though, the bad guys often put a lot of pieces together to get that network access.

Physical Social Engineering (PSE) engagements allow organizations to see the weaknesses in their buildings, offices, and other facilities. Red team engagements combine our PSE tests with phishing, network, and application tests to show our customers what a malicious hacker might accomplish using every point of access from every angle.

In this new series, I’ll focus on the steps and tools we use for PSE and Red Team engagements.

Let’s Be Ethical

First and foremost, Raxis does not condone the use of these tactics in an illegal manner, and I want to stress that doing so is likely against the law. The information we provide here is for use only by security professionals with legal contracts providing the appropriate permissions. Do not try this at home. Okay, maybe I’ve always wanted to say that!

Always have written permission from your clients with you at all times when performing PSE activities. Colloquially known as a “Get out of Jail Card,” this should be a document, providing your information and a valid date range for your testing, as well as the names, contact information, and signatures of at least two people from your customer who have the authority to explain to employees, or even the police, that you are legally allowed to be doing what you are doing. I carry one copy in my backpack, one in my wallet, and one in my pocket. In this case, overkill doesn’t really exist.

Beyond that, your company and your customer should both have access to the legal contract for your engagement, including the scope of your testing. I cannot stress enough how critical it is to follow the scope of that contract precisely.

Getting Started on your Physical Social Engineering Assessment

With that out of the way, the work for PSE assessments starts before you even leave home. Your first step should always be doing reconnaissance on the in-scope facilities. This includes performing OSINT (Open-Source Intelligence) on the locations and employees.

Offsite OSINT

I generally begin by reviewing satellite imagery of the locations and any photos I can get of the entrances and exits. This includes looking at Google Maps, looking at Google Street View, reviewing the organization’s social media (don’t forget job-related sites like Glassdoor and LinkedIn). It can also include reaching out to different building services to find out what onsite security is like.

Using all the data you get from this, you should begin to put together a list of possible entry points.

  • Does the main entrance look like can be bypassed with canned air?
  • Does the back entrance look like the latch is unprotected? 
  • Is there a designated smoking area?
  • Is there a recreational area?
  • Where is employee parking?

These are all questions that you want to catalog and find the answers to.

OSINT Tools

There are several tools that allow one to enumerate an organization’s digital footprint, including but not limited to, TheHarvester, ReconNG, and Amass shown below.

Sample amass test results

Maybe I’ll go into some of these tools more in a later post in our Cool Tools series.

Onsite Recon

Once onsite, we can perform additional reconnaissance to establish the attack surface of the facility:

  • Is there building security?
  • Can you enter the target area at night?
  • Where can you hide until closing?

This is the time to get those answers.

While performing initial onsite recon, I usually dress differently than I plan to dress when I come back later try to gain entry. You have to expect to be seen by cameras, security guards, and employees, and, before you understand the layout and gather more info, you may look suspicious. It’s better not to have anyone associate entry-bypass you with recon-you.

Speaking of entry-bypass, I hope you’ll check back for my next post in this series on Physical Entry Bypass Techniques.


Raxis Attack

Continuous, expert-led PTaaS combined with advanced automation to uncover and address hidden vulnerabilities, ensuring your business stays ahead of evolving cyber threats while maintaining regulatory compliance.

Raxis Protect

Continuous vulnerability scanning, real-time asset management, and expert guidance to proactively identify and address security gaps across your entire digital ecosystem, ensuring 24/7 protection against evolving cyber threats.

Raxis Strike

Tailored, expert-led penetration testing that uncovers hidden vulnerabilities using real-world hacker techniques, providing actionable insights to strengthen your defenses and protect against sophisticated cyber threats.

Partner With Raxis

Partnering with Raxis empowers your business with elite penetration testing services, competitive reseller pricing, and recurring revenue opportunities, all backed by a proven track record of excellence and a commitment to staying ahead of evolving cybersecurity threats.

More From Raxis

  • Cool Tools Series: Vim

    Cool Tools Series: Vim

    By Andrew Trexler • January 14, 2025
  • Cool Tools Series: Masscan

    Cool Tools Series: Masscan

    By Andrew Trexler • December 3, 2024
  • Password Series: Defeating Emerging Password Security Trends with Psudohash

    Password Series: Defeating Emerging Password Security Trends with Psudohash

    By Ryan Chaplin • November 5, 2024
  • Cool Tools Series: MSFvenom

    Cool Tools Series: MSFvenom

    By Nathan Anderson • October 8, 2024