


Proven Expertise in Physical Penetration Testing
Since 2011, Raxis has been at the forefront of physical social engineering and penetration testing, helping organizations worldwide identify and close critical security gaps through hands-on, expert-led assessments.
Global Reach, High Stakes Clients
Raxis Red Team engineers have flown across the globe — from North and South America to Europe and beyond — to test some of the most secure environments, including:
Battle-Tested Tactics, Every Single One
We’ve successfully executed every advanced physical tactic on our list in live engagements — from canned air attacks on data center sensors and badge cloning to lock picking, under-door tool bypasses, perimeter breaches, dumpster diving, and sophisticated pretexting. These aren’t theoretical exercises; they’re proven methods that we’ve used.
Physical Security Testing Experience Matters
With more than a decade of refining adversary emulation, our team brings the creativity, persistence, and precision of real threat actors — always within strict rules of engagement and legal boundaries. Clients trust Raxis because we deliver results that matter: clear proof of risk and actionable steps to eliminate it.
Physical Access Stories That Drive Change
Every engagement ends with comprehensive reporting, remediation guidance, and gripping Hack Stories that bring the breach to life for executives and teams. These real-world narratives are powerful tools for building awareness and securing buy-in for security improvements.
Why Physical Penetration Testing?
With Raxis physical social engineering penetration testing, you gain the confidence of knowing exactly where your facilities are vulnerable—before a real attacker exploits them.
Physical Social Engineering: Beyond Digital Threats
Physical social engineering penetration testing is a cornerstone of our advanced Red Team penetration testing services.
Handled by Red Team Engineers
Every physical test draws on real-world offensive security experience, ensuring creative pretexts and tactics that generic assessments can’t match.
Core Integration in Red Team Operations
Physical access often chains into full compromise, such as planting network implants or exfiltrating data — demonstrating risks in MITRE ATT&CK-aligned scenarios.
Standalone or Full-Scope Flexibility
Use focused physical social engineering for targeted awareness, or integrate with broader Red Team exercises (including phishing via our dedicated service).
Advanced Physical Tactics We Employ
Our physical social engineering penetration testing goes far beyond basic tailgating. We’ve done all of these on real engagements, ask us to tell you stories!
Tailgating & Pretexting
Seamlessly following employees through secure entrances or talking our way past reception and guards with convincing stories.
Badge Cloning & Access Bypass
Cloning legitimate badges for unrestricted entry into restricted areas, including server rooms and executive suites.
Canned Air Attacks
Using inverted canned air dusters to trigger door sensors and alarms, granting unauthorized access to sensitive facilities like data centers.
Onsite Impersonation & Loitering
Posing as vendors, contractors, or visitors to exploit trust, access unlocked workstations, or retrieve sensitive items (e.g., keys, passwords).
Device Implantation
Planting covert "Raxis Transporter" devices for persistent remote access, proving the real impact of a physical breach.
Lock Picking & Bypass
Expertly picking mechanical locks or bypassing electronic keypads on doors, cabinets, and safes to access restricted physical assets.
Under-Door Tool Attacks
Sliding specialized tools under doors to manipulate internal handles, latches, or crash bars from the outside.
Fence & Perimeter Breaches
Climbing, cutting, or exploiting weaknesses in perimeter fencing and barriers to gain initial site access undetected.
USB Drop Attacks
Strategically placing baited USB devices in common areas (parking lots, break rooms) to test employee curiosity and handling protocols.
Camera & Sensor Evasion
Using IR illuminators, reflective clothing, or timing to defeat surveillance cameras and motion detectors during infiltration.
Dumpster Diving
Searching through onsite trash and recycling for sensitive documents, passwords, access cards, or operational intel that aids infiltration.
Request-a-Badge or Help Pretext
Approaching employees with a believable story (e.g., "forgot my badge" or "new contractor needing temporary access") to get them to badge us in directly.
How Hackers Bypass Physical Security
Raxis Hack Stories
Confidence is King
Our stories are based on real events encountered by Raxis engineers; however, some details have been altered or omitted to protect our customers’ identities.
When our elite penetration testing team dives into physical social engineering, whether it’s a laser-focused PSE test or a full-throttle Red Team operation, confidence is our secret weapon. We're often stunned at how many people accept that we belong simply because we act like we do. Even more jaw-dropping? The number of folks who spot something fishy but don’t raise the alarm. As our tests ramp up, we push the boundaries with bolder moves, daring employees to call us out. Spoiler: they rarely do.
On one assignment our team was tasked with infiltrating a sleek, big-city high-rise with a break room so stocked with free eats that employees practically lived there for breakfast and lunch. Our team did their homework, scoping out every detail before arriving onsite. On a bustling Monday morning, they slipped in one by one, tailgating through turnstiles and blending into crowded elevators before the guard could figure out what was happening. Each operative strolled onto the target floor, flashed a charming wave at the receptionist, and proceeded to regroup in that legendary break room. Then they split up to take a look around the floor. Unlocked workstations? Check. Sensitive customer documents left on a printer? Check. After gathering proof for the customer's report, they glided out one by one, leaving no trace and not a single soul batted an eye.
In another operation, our team targeted an office secured by key card access. The plan? Pure audacity. They grabbed coffees from a local shop across the street and loitered by the parking lot entrance just before the 5pm rush. Sipping their coffee inconspicuously, our team chatted like they were waiting for a buddy to clock out. No aggressive moves, just casual vibes. Sure enough, several employees held the door for them. As the crowd thinned, they offered their thanks and slipped inside. For an hour, they laid low under a conference room table, biding their time before exploring. What did they find? A treasure trove of vulnerabilities: unlocked file cabinets stuffed with sensitive customer data, passwords scrawled on notes tucked under keyboards, a visitor badge stashed in a desk drawer, open network ports perfect for planting a network implant device (of course they did that), and even keys to the data center left in an unlocked cabinet. Our team made use of those keys to drop a second device for good measure. The cleaning crew? They just waved as our team worked. Hours later, our team sauntered out, armed with a visitor badge for a potential encore and leaving devices in place for further exfiltration.

