Alternatively, materials for making fake IDs are available on the Internet at A more brazen approach is to talk his or her way inside. If an attacker has to display a badge, they have to steal one. ![]() Another way is blending in with a group of people. Once open, the attacker follows the person inside, thus, piggybacking on that person’s authorization (also known as tailgating). One way is for the attacker to loiter by the company entrance and wait for an authorized person to unlock the door. How attackers gain illicit entry to a corporation’s premises depends on the company’s security posture. In Hack the Stack, 2006 Unauthorized Entry
0 Comments
Leave a Reply. |