Jayson E. Street, an InfoSec professional and former law enforcement officer, shares his wild tale of infiltrating a bank in Beirut. He humorously recounts his blunders, including mistakenly targeting the wrong bank. The conversation covers the vulnerabilities of physical security and the creative tactics used to exploit them, like disguising tech as everyday objects. Engaging stories reveal the surprising ease of some heists and the chaotic rush of the operation, blending tension with humor in a thrilling narrative of deception.
Testing physical security allows for identifying vulnerabilities in banks' systems and preventing potential breaches.
Security awareness engagements emphasize the importance of employee vigilance and adherence to security policies to protect against unauthorized access.
Deep dives
Testing Physical Security of a Bank
In this episode, the speaker discusses the process of testing the physical security of a bank. The goal is not to steal cash, but rather to gain access to the teller's computer. The speaker highlights the various ways one could potentially bypass the physical security measures in place, such as unlocking back doors, jumping over short barriers, or identifying blind spots in camera surveillance. The story follows a professional who conducts security awareness engagements for companies, testing their physical security measures and educating employees on potential vulnerabilities.
Engagements and Techniques
The speaker explains how security awareness engagements are conducted, emphasizing that the objective is to educate rather than exploit. The professional shares his experiences of visiting bank branches, gaining unauthorized access to computers by using tools like USB rubber ducky, which simulates a keyboard to show vulnerabilities. The speaker also recounts instances where he successfully compromised multiple computers and network equipment, highlighting the importance of employee awareness and vigilance in preventing breaches.
Accidental Break-ins and Consequences
The speaker recounts a story of accidentally breaking into the wrong bank during an engagement in Beirut. Despite the unintended entry, he succeeds in compromising computers before realizing his mistake. In another engagement, the speaker faces suspicion from an employee who questions his presence. Though he escapes, he acknowledges that his actions crossed a line and emphasizes the need for careful verification and adherence to security policies to protect against unauthorized access.