[52] Using Food to Bypass Security: Red Team Stories

แชร์
ฝัง
  • เผยแพร่เมื่อ 10 ก.ย. 2020
  • In this video I take you through how I was able to use nothing more than a bag of fast food to get into a restricted-access facility.

ความคิดเห็น • 72

  • @God8-O
    @God8-O 3 ปีที่แล้ว +157

    I thought you were going to say you bribed a gaurd with some McDonald's 😂

    • @amihirata
      @amihirata  3 ปีที่แล้ว +41

      Honesty, I've heard stories from colleagues who have used that (not necessarily outright bribing) but sharing food to develop rapport with guards and employees to gain their trust

    • @cate01a
      @cate01a 10 หลายเดือนก่อน

      @@amihirata ahh shit like in better call saul

  • @LawGPT
    @LawGPT 3 ปีที่แล้ว +77

    Social engineering is an effective tool that's often overlooked. If you look like you belong, you'll go unnoticed the vast majority of times. Solid research and preparation make it even more effective. Well done.

    • @amihirata
      @amihirata  3 ปีที่แล้ว +4

      Thank you!

  • @foxtailedcritter
    @foxtailedcritter 3 ปีที่แล้ว +30

    That's food for thought... Huehuehue.

  • @cursedvoid
    @cursedvoid 3 ปีที่แล้ว +60

    The picking rig is nice i must say, however i am definitely enjoying the content there. I would love more stories, maybe one from your first few jobs from it.

    • @amihirata
      @amihirata  3 ปีที่แล้ว +14

      I'll see what I can do! I have several stories to tell, I just need to figure out what medium I want to set them in!

    • @dannileigh6426
      @dannileigh6426 2 ปีที่แล้ว +1

      Where did you get/find that rig?

    • @xathridtech727
      @xathridtech727 2 ปีที่แล้ว

      @@amihirata I would love to hear a story of how you got into this field I'm in IT and I'm debating between security and networking doing a small dive into both before I commit to either. I've found a lot of physical security important and validating to see (especially moving my roommates crown Vic) but I don't understand how you even start in this field without doing things that are illegal

  • @Slickjitz
    @Slickjitz 3 ปีที่แล้ว +47

    I feel if he seemed persistent about seeing your ID, while attempting to get your wallet you “accidentally” drop your food as well. Now the guard would even have sympathy towards you and probably not bother asking after hopefully helping or watching you upsettingly picking your food off the floor as you complain to yourself about not having time to get more food as you have a meeting I’m a few minutes.

    • @amihirata
      @amihirata  3 ปีที่แล้ว +28

      That’s a very good backup too!

    • @jayschafer1760
      @jayschafer1760 3 ปีที่แล้ว +8

      That's a great idea. Plus, dropped food = mess = distraction, especially in a busy entrance. The security guard is going to want to get a cleaning person right away before the mess gets tracked around.

  • @tdtour
    @tdtour 3 ปีที่แล้ว +24

    The problem with this story is that, no one takes their briefcase with them when the go to pick up lunch.

    • @SoDamnMetal
      @SoDamnMetal 10 หลายเดือนก่อน

      Maybe he's got some important crap in there that can't be left lying around 🤔

  • @SRTscout911
    @SRTscout911 3 ปีที่แล้ว +8

    I used to work executive protection and security saturation. I Absolutely love your videos and stories. Once in a while will share your videos with me team, like this one. Please share more and thank you

    • @moisheseinfeld3894
      @moisheseinfeld3894 ปีที่แล้ว

      Y’all hiring? I have surveillance detection experience

  • @kevenquinlan
    @kevenquinlan 3 ปีที่แล้ว +5

    Wow. What is this some kind of test? I was slightly taken aback by how hard it was to concentrate on your story while watching you pick, lol. Both were enjoyable. Thinking on the fly and being able to lie are super important. I lived @ McCarren airport for 2 1/2 years. Now, I'd get pinched once in a blue moon and the officer would always ask for my ID- run it- and see what came back. After the first time, I started to just say that I had lost my wallet at the previous airport and had contacted them to contact me if it turned up. SO= then they ask for the SSI#. I gave them a fake one. It had occurred to me that they were not using a legit police-type search but only to compare it to other known ssi#'s they've put into the system @ the airport. Funny thing is I got pinched by a guy/ fake credentials/ then he pinched me like 10 days later= I did the same thing and he must not have recognized me? Which amazed me because although thousands of people pass through an airport every day- I absolutely remembered him- which leads me to= not everyone's memory is as good as you might think. All I had to do was alter my routine- have a fake ssi# in my head= good to go. I know you're probably asking yourself, 'How the fuck do you live @ an airport for 2 1/2 years?' Be Creative.

  • @villian_von_badguy_ii145
    @villian_von_badguy_ii145 3 ปีที่แล้ว +6

    Another Great video .. love the stories .. Also nice work the picking ..

  • @Toweringcoin8
    @Toweringcoin8 3 ปีที่แล้ว +8

    Yes definitely more stories. Love them!

  • @inqmusician2
    @inqmusician2 4 หลายเดือนก่อน

    Speaking of pre-texts, I had an assignment in college where I'm supposed to fool both introvert and extravert security guards.
    I made up a plan which was unethical, but very hypothetical that it would happen with bad actors. I pretended to be a investigation agency intern(in my country it's SBU).
    Specific pretext required an OMG cable, laced with malware, 3 team members(one will be perfoming one of the actions for building rapporting later on. second one will deliver the malware and third one will execute malware on stealth-mode, so that I wouldn't look suspcious once I leave the building), depleted phone, some papers(it can be anything, but the first four are necessary for the cover to work)
    So, the plan begins at 10:30 PM, where team member one is walking like stupidly suspicious in front of the building.
    About an hour later, when security guards are preparing to sleep, I(team member 2) step out of the car, making my way in to the building, preparing my fake SBU intern badge. Since no one has saw this badge in existence(real ones), they would believe me.
    I walk into the security post, making sure that the pre-text would go accordingly. I would go and give them a copy of
    I say along the lines that the big guys wouldn't go and they sent the lowest chain and they won't start the investigation until everything lines up.
    They would say that the cameras saw team member 1, but for the cover to work I need to snap a picture of this. I present them with a choice.
    A: show the skinny dude a camera screen specifically at 10:30 PM timecode
    or
    B: go an do a write-up.
    Since they don't want to do B, they would show the recording at the specified timecode. So I would pull out the phone to take a picture, but oh boy. Battery is dead.
    I would ask them if I could charge a phone. And this is where the OMG cable comes in to play. Since security guards aren't allowed to do anything other than security related tasks on these, so the computers would be connected to a secure network(from my experience at least). I would plug in the OMG cable and deliver the malware on one end, and on the other end, plug in the phone, so it wouldn't look suspcious. A few minutes later, I turn on the phone, snap a picture, while my team member 3 connects to the network and executes stealth mode for the malware. I got what I needed. And then I leave with a snapped picture of a CCTV recording, plus, I can revisit the same computer remotely in a few days or even weeks.
    I got the highest grade for this.

  • @Poseidon-vr9rj
    @Poseidon-vr9rj 2 ปีที่แล้ว +2

    The vulnerability was: discretion.
    Good story, man.

  • @keithfagan9250
    @keithfagan9250 2 ปีที่แล้ว +2

    Really good to see the use of tension. I'm a newbie, and this really helped 👍👍👍

  • @Chirael
    @Chirael 3 ปีที่แล้ว +1

    Very cool, thanks for sharing this as well as the interesting backdrop 😊

  • @juliangulian1032
    @juliangulian1032 2 ปีที่แล้ว

    We’ve never met I hope we do someday for learning purposes of course. Watching you pick all the locks assuming it to you is very very pleasing, I am wonderful at picking digital locks sadly I’m not as good when it comes to physical locks, but I am training. Hope your day is great mate. Stay Blessed🙏😇🙏

  • @muchozolf
    @muchozolf 3 ปีที่แล้ว +4

    This is so darn cool! Also, MORE. Already subbed.

  • @tomasbargad7418
    @tomasbargad7418 3 ปีที่แล้ว

    I love your content! Not much people doing videos about this subject. Subscribing for more! :)

  • @ashleymarie7452
    @ashleymarie7452 2 ปีที่แล้ว

    Excellent. Yes, please do more social engineering videos!

  • @TheJpmaster69
    @TheJpmaster69 3 ปีที่แล้ว +2

    phenomenal

  • @MarcLerchs
    @MarcLerchs 2 ปีที่แล้ว +3

    Absolutely brilliant. This is exactely why the good spies can enter everywhere. :)

  • @Nick-jg9ck
    @Nick-jg9ck ปีที่แล้ว +1

    Reminds me of the story about how a pizza deliver guy got onboard of a top secret submarine

  • @JohnnyQuickdeath
    @JohnnyQuickdeath 3 ปีที่แล้ว +3

    If he has just let you get your ID, what would you have done?

  • @ctbch
    @ctbch 3 ปีที่แล้ว +2

    what would you have done if he wanted to see your ID?

  • @thomast6741
    @thomast6741 2 ปีที่แล้ว +2

    Link to the picking rig? That looks like fun practice

  • @Eurotool
    @Eurotool ปีที่แล้ว +2

    What was your plan B in case he attempts scanning your empty ID?

  • @getoutside2854
    @getoutside2854 3 ปีที่แล้ว +3

    I like that practice housing! Off the shelf or custom build?

    • @asroneightyseven3854
      @asroneightyseven3854 3 ปีที่แล้ว +1

      @@ts757arse I'd buy one if anyone can find where I can order it.

    • @amihirata
      @amihirata  3 ปีที่แล้ว +1

      It’s a custom build of my own! You can find them on the lock lab for free:
      locklab.com/the-not-so-civil-engrs-3d-kik-stands/

    • @asroneightyseven3854
      @asroneightyseven3854 3 ปีที่แล้ว

      @@amihirata Awesome thank you!

    • @asroneightyseven3854
      @asroneightyseven3854 3 ปีที่แล้ว

      @@ts757arse The who and where were a little off but you nailed it with it being 3D printed!

  • @ceefusjenkins2281
    @ceefusjenkins2281 2 ปีที่แล้ว

    Is there an STL for that picking jig???

  • @bill1fishing
    @bill1fishing 3 ปีที่แล้ว

    Where can I get a practice board like that please ?

  • @THEMAX00000
    @THEMAX00000 ปีที่แล้ว

    This is so embarrassing. This is why I need to get into Pin testing

  • @jrsixowfour8674
    @jrsixowfour8674 3 ปีที่แล้ว

    Where can I get that lock picking stuff?

  • @jamesr5741
    @jamesr5741 3 ปีที่แล้ว +1

    Sounds like the Pentagon.

  • @GardenBoat
    @GardenBoat 2 ปีที่แล้ว

    Your content is AA-class

  • @SofaKingShit
    @SofaKingShit ปีที่แล้ว

    A story about the effectiveness of good acting or "social engineering" as the cool kids say.

  • @DonzLockz
    @DonzLockz 2 ปีที่แล้ว

    Very clever but I would panic and fail. Lol

  • @JohnnyQuickdeath
    @JohnnyQuickdeath 3 ปีที่แล้ว +1

    MAXIMUM BLUFF

  • @smb1397
    @smb1397 ปีที่แล้ว

    what was your plan if this didnt work out

  • @essbee2052
    @essbee2052 2 ปีที่แล้ว

    they should create locks that time you based on how fast you can unlock it with a key so if it took an average person to unlock a lock with a key, 6 seconds to unlock it make it a 5 second timer so that lock pickers could not possible imagine to crack it in such time

  • @xbrucexx
    @xbrucexx 3 ปีที่แล้ว

    Another left handed picker!

  • @happysnus
    @happysnus 3 ปีที่แล้ว

    Please make more videos!

  • @Blaculo
    @Blaculo 3 ปีที่แล้ว +2

    I need one of those kik holders.

    • @amihirata
      @amihirata  3 ปีที่แล้ว +4

      Thank you, I made them myself! Check out the lock lab link where Bill hosted the files for free!
      locklab.com/the-not-so-civil-engrs-3d-kik-stands/

    • @jamesdavis332
      @jamesdavis332 3 ปีที่แล้ว

      @@amihirata I'm having issues printings those, my software isn't scaling it right. What should the depth of the print be?

    • @amihirata
      @amihirata  3 ปีที่แล้ว +1

      @@jamesdavis332 youll need to scale it from mm to in, so 25.4x

    • @jamesdavis332
      @jamesdavis332 3 ปีที่แล้ว

      @@amihirata thanks, thought that might be the case

  • @nickgardner6340
    @nickgardner6340 2 ปีที่แล้ว

    lol, that's just how to be a good liar, I can definitely do that...

  • @darkmann12
    @darkmann12 3 ปีที่แล้ว

    damn those are deep false sets!

    • @amihirata
      @amihirata  3 ปีที่แล้ว

      Locksport picking (shown) is vastly different from IRL picking. In the field I’d be hard pressed to open a single American 1100 in the time it took me to open all 8 of these locks

    • @darkmann12
      @darkmann12 3 ปีที่แล้ว

      I know :P

    • @darkmann12
      @darkmann12 3 ปีที่แล้ว

      @@amihirata pretty cool rig though

  • @InsaneBlizz
    @InsaneBlizz 2 ปีที่แล้ว

    why do we have to be civil if you are not so civil?

    • @amihirata
      @amihirata  2 ปีที่แล้ว +1

      One of has gotta be civil and it aint gon be me!

  • @markushill53
    @markushill53 3 ปีที่แล้ว

    What’s your email

  • @danielspringer2381
    @danielspringer2381 2 ปีที่แล้ว

    Be civil

  • @miner4236
    @miner4236 11 หลายเดือนก่อน

    bro do you not realize how disturbing and annoying that clicking is from the lock picking ? Besides, there's nothing to see. Just put a massive unicorn in the middle of the screen and blast Gangnam Style and it'll be less distracting.

  • @Master-ls2op
    @Master-ls2op ปีที่แล้ว

    food.. inspector... some kind. Comcast. love Comcast.. horrific service no communication and use of contractors like its they jobs. i put a ladder against a poll.. tell security that i am looking into a problem with the line. get IT to escort me to they server room. look at the equipment go okay. look at the line for a bit. go i don't really want to take ya service down to do hard test of our signal. some times they say please do so. i then do AND DROP MY EQUIPMENT IN THE LINE. love it. met a middle man device right on the line easy. they even asked for it. will improve service.... NO ONE EVER CHECKS!! THEY think o someone put in a service request or that Comcast is being proactive or trying to trouble shoot something to prevent them from having problems.