Creating a rogue physical device
Kali also facilitates attacks where the intruder has direct physical access to systems and the network. This can be a risky attack, as the intruder may be spotted by an observant human or caught on a surveillance device. However, the rewards can be significant because the intruder can compromise specific systems that have valuable data.
Physical access is usually a direct result of social engineering, especially when impersonation is used. Common impersonations include the following:
- A person who claims to be from the help desk or IT support and just needs to quickly interrupt the victim by installing a system upgrade.
- A vendor who drops by to talk to a client, and then excuses himself to talk to someone else or visit a restroom.
- A delivery person dropping off a package. Attackers can buy a delivery uniform online; however, since most people assume that anyone who is dressed all in brown and pushing a handcart filled with...