150PHYS Base

Social Engineering – Physical

On this page

    Service Overview

    DeepSeas' Physical Social Engineering service offers organizations the opportunity to simulate real-world attack scenarios to assess and enhance security awareness and identify personnel vulnerabilities without the consequences of actual social engineering breaches. The service involves DeepSeas consultants physically visiting the target location, engaging in both overt interactions-where they persuade employees to perform specific actions-and covert tactics-where they attempt to discreetly gain access to restricted areas. These approaches can be combined within a single assessment for a thorough evaluation of facility and personnel security. The results of these simulations are compiled into actionable reports that detail the organization's vulnerability to social engineering attacks and their potential business impact. This testing provides crucial insights into the organization's security posture and employee awareness, helping to identify security gaps and guide the allocation of resources effectively.

    Methodology

    1. Pre-engagement - This initial phase involves gathering critical details such as test windows, test dates, and contact information. It establishes the rules of engagement and is essential for the overall success of the assessment.
    2. Information Gathering - In this phase, we conduct reconnaissance using tools and techniques such as Google Maps, LinkedIn scraping, and website mirroring to collect open-source intelligence (OSINT) about the target. This intelligence is crucial for crafting realistic attack scenarios and understanding the target environment.
    3. Physical Reconnaissance - This step involves covert observation and physical visits to the target locations to document security measures like cameras and access controls, observe employee behaviors, and potentially clone access badges. The gathered information lays the groundwork for the attack plan.
    4. Pretext & Exploitation - DeepSeas consultants create and deploy convincing pretexts to engage with the target, using both overt and covert tactics to elicit unauthorized actions or information. This phase simulates real-world attacks to test how well targets adhere to security protocols under pressure.
    5. Reporting - The final phase involves compiling all the findings, actions, and results into a detailed and actionable report. This report includes evidence and prioritized recommendations for security improvements. It is reviewed internally, then uploaded to the client portal, and discussed in a debrief call if requested by the client, ensuring clear communication of findings and suggested mitigation strategies.